0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x56800000, {{0x2, 0x4e20, @multicast1}}}, 0x88) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r2, 0x0, 0x60, &(0x7f00000000c0), 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000100)=0x10000, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200258f0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xfffff000}}}}]}]}, 0x70}}, 0x0) 15:53:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r2, 0xb6c, &(0x7f0000000240)="e70581c91e6c216235f0f06cf462fbf2368fbaaa123190168538a1f4070d3f630ddb8514bca9ec62f4d9dad51e3bdb2626995eb629171a87b7a28c034cfb90bb9dec8ccfada615e78a15b9dce18814998d094216437470c4759f4c1adbb45d5b16ec3781aa28fa4fca87a110b3207937a76bf80f06cc686e83d627054ef401c23db3e1f16b41f318c798394398f7a8e4754d46b9fcaadca3c1489117245f28eead3dd6d0c0dafb610c708a56a4c42f29a5c13bc6f1c888f09c0f4406b338a2fbfe901530a4326b") pipe(&(0x7f0000000040)) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x1, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0xa, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map={0x18, 0x6, 0x1, 0x0, r0}, @map={0x18, 0xa, 0x1, 0x0, r1}, @generic={0x3, 0x8, 0x9, 0x1f, 0x8}, @map={0x18, 0x1, 0x1, 0x0, r3}], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1356.007708][T13717] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1356.054042][T13717] device ipvlan764 entered promiscuous mode [ 1356.132329][T13717] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc}, 0x0) 15:53:18 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000003000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1356.207450][T13717] device ipvlan765 entered promiscuous mode 15:53:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025900535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe}, 0x0) 15:53:18 executing program 0: r0 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000340)=0x10, 0x80000) listen(r0, 0x702) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0xa, 0x0, 0x8}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8c4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000001cc0)="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", 0x1000}], 0x1, 0x1) splice(r2, 0x0, r3, 0x0, 0x10000, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000b80)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000bc0)={0x0, 0x4}, &(0x7f0000000c00)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000c40)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000001c80)=0x1008) r6 = socket(0x10, 0x20000000802, 0x0) write(r6, &(0x7f0000000040)="240000001a0025f00018000400edfc0e8000000000000000000000000800010048050000", 0x24) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = socket(0x10, 0x20000000802, 0x0) write(r8, &(0x7f0000000040)="240000001a0025f00018000400edfc0e8000000000000000000000000800010048050000", 0x24) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x90, 0x10, 0xffffff1f, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4412}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x58, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6}, @IFLA_IPTUN_ENCAP_LIMIT={0x5, 0x6, 0x3}, @IFLA_IPTUN_ENCAP_DPORT={0x6}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x3}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0x4}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e22}]}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x90}}, 0x40) 15:53:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0x80, 0x80000) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000000c0)={r3, 0x3ff, 0xaf, "4e04b3ef4f7d54a1a400d03172ddd6bfcc181a5c8c209f8a9e8d682449971e8868309c91d8d8d6708e94a1b173fb562cd36478e13e27f8b06acdf7464d49a332cdd622b887d14bdb28949d827249de3c1dc19aafb4ef4b5c74309d28f96e18a5f97a7d60c77f458ce542e7b69b87d7d01e466c50edf4cb395d536bd438984a247074825eb283b394bf31848e43106ac2e5ad059cc32bd2d9ca7e9fd646b7ac0faa769145f41690950b364c47a35d60"}, 0xb7) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf}, 0x0) [ 1357.492368][T13743] __nla_validate_parse: 8 callbacks suppressed [ 1357.492379][T13743] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1357.511525][T13743] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1357.533916][T13746] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xffffff7f}}}}]}]}, 0x70}}, 0x0) 15:53:19 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000004000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1357.609620][T13746] device ipvlan766 entered promiscuous mode 15:53:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xffffff9e}}}}]}]}, 0x70}}, 0x0) [ 1359.107494][T13752] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1359.118637][T13752] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1359.128665][T13765] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1359.138143][T13765] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000480)={0x3, 'ip6gretap0\x00', {0x2}, 0xfff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x2000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) connect$pppoe(r3, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f00000001c0)) sendfile(r3, r2, 0x0, 0x100080737) r4 = accept$inet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x10) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x0, 0x250, 0x250, 0x250, 0x250, 0x340, 0x340, 0x340, 0x340, 0x340, 0x3, 0x0, {[{{@ipv6={@local, @remote, [], [], 'veth1_to_batadv\x00', 'veth0_to_hsr\x00'}, 0x0, 0x228, 0x250, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'erspan0\x00', {0x2, 0x0, 0x48, 0x0, 0x0, 0xffffffff, 0x8}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x470) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001240)=ANY=[@ANYRES16, @ANYRESHEX], 0x8c}}, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000000140)={@remote, @multicast1, @local}, &(0x7f0000000180)=0xc) [ 1359.178799][T13755] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1359.207428][T13755] device ipvlan767 entered promiscuous mode [ 1359.257262][T13757] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1359.271565][T13757] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x10}, 0x0) 15:53:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025910535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x201, 0x8, 0x745, r2}, &(0x7f0000000040)=0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1359.373616][ T29] audit: type=1804 audit(1591890801.627:673): pid=13796 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/943/cgroup.controllers" dev="sda1" ino=16032 res=1 [ 1359.446866][T13798] xt_hashlimit: invalid interval [ 1359.467418][T13796] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1359.502466][T13796] File: /root/syzkaller-testdir573716612/syzkaller.oU1AGf/943/cgroup.controllers PID: 13796 Comm: syz-executor.0 15:53:21 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000005000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xfffffff0}}}}]}]}, 0x70}}, 0x0) [ 1359.585899][T13801] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1359.604513][T13801] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x11}, 0x0) [ 1359.658005][T13805] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1359.717739][T13805] device ipvlan768 entered promiscuous mode 15:53:22 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x8000000000001, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x7c, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x68, 0x1, [@m_tunnel_key={0x64, 0x3, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000030003dfa00000000000000000000000050000100340001000f00010074756e6e456c5f6b657900003400028014000b000e0000000000000000000000000000001c00020000000000000000000000000000000000000000000000000004000600000006000000000000000000000008000000000000000000"], 0x64}}, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)=ANY=[], 0x48) [ 1360.116673][T13827] IPVS: ftp: loaded support on port[0] = 21 15:53:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmmsg(r1, &(0x7f0000007fc0), 0x0, 0x48818) [ 1361.007112][T13842] IPVS: ftp: loaded support on port[0] = 21 [ 1361.298764][T13809] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12}, 0x0) 15:53:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0xffffffff}}}}]}]}, 0x70}}, 0x0) [ 1361.358809][T13809] device ipvlan769 entered promiscuous mode 15:53:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025920535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1361.412641][T13827] virt_wifi0 speed is unknown, defaulting to 1000 15:53:24 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000006000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1362.625426][T13840] __nla_validate_parse: 4 callbacks suppressed [ 1362.625436][T13840] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.642666][T13840] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.653147][T13845] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.665134][T13845] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.684814][T13847] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1362.736616][T13847] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1362.768355][T13856] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1362.777689][T13856] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xf}}, 0x0) 15:53:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x13}, 0x0) 15:53:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r5, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1f}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7fffffff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000840}, 0x4000010) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 1362.829511][T13858] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1362.912165][T13858] device ipvlan770 entered promiscuous mode 15:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x10}}, 0x0) [ 1362.956283][T13867] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1362.976013][T13867] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1363.069791][T13868] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x13}}, 0x0) [ 1363.123564][T13868] device ipvlan771 entered promiscuous mode 15:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xc0}}, 0x0) 15:53:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000000)={'geneve0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) sendfile(r3, r0, 0x0, 0x8000000000004) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 15:53:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025930535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x60}, 0x0) 15:53:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xffffffffffffff1d) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f00000000c0), 0x0) sendto$inet(r1, &(0x7f0000000000)="dc1157dee00cfa1e85ba74c2efd5904deb9a26186517e10a64e0f2ce453ea6d34b091c1d13cb98cf2ae26aa3fc6b03ae9e214b77c53a8df1061c76d71927d899e17633016f31ba6f9795671331772c626803fb31ea5c38620f7a2919acae2ce078b2ac261a11d12509a9a2956349dd8ea38ccd09f333629ff283cad4dcc6c4d95b1c9b4da714f0532055010101edd8b6c2a87caadb847c32f07d77b69155c9ded3be96f4aaefa9c64a23b7e3c6ef154d9922e99641fee4474fb3c15617aa71f84c6e42e5eaafd421327f8ff808511ba6bb4242438b09d6d8b0b84688d2cbfc8e960934e2c4df638aa0e47d67d4b3", 0xee, 0x800, &(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xec0}}, 0x0) 15:53:36 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000007000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) r1 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) getsockopt(r1, 0xf29, 0x2, &(0x7f0000000080)=""/198, &(0x7f0000000180)=0xc6) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x33fe0}}, 0x0) 15:53:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0}, 0x0) [ 1374.151681][T13954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:36 executing program 0: unshare(0x60000200) mmap(&(0x7f000074c000/0x4000)=nil, 0x4000, 0x3, 0x4012010, 0xffffffffffffffff, 0x1000) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = socket$nl_audit(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/101, 0x65}], 0x1) splice(r2, 0x0, r4, 0x0, 0x20000000003, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xfffffffffffffd86, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffec2) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2, r5, 0x0, r6}, 0x10) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x10}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 1374.214619][T13954] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1374.292083][T13967] IPVS: ftp: loaded support on port[0] = 21 [ 1374.299733][T13958] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1374.333191][T13958] device ipvlan772 entered promiscuous mode [ 1374.359709][T13967] virt_wifi0 speed is unknown, defaulting to 1000 [ 1374.376888][T13958] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:36 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x20000270}}, 0x0) 15:53:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x204}, 0x0) [ 1374.465509][T13958] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1374.499300][T13962] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1374.583149][T13962] device ipvlan773 entered promiscuous mode 15:53:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025940535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7ffff000}}, 0x0) 15:53:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000004880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000048c0)=0x14) getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r4, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmmsg(r0, &(0x7f0000002900)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x83, 0x3f, "c69adde3844c135ad84b547355ba9c451284fd9447a28e14e81e5dd1ec89ca782c34c597e3cda667676d9d438c72fcce77a6754ede84205dc63b1e55aecd19", 0x3}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000040)="33ff0e10dc0c4228285800657efc95c659461bb4b15bbc10cd996ba414c5ff81a846faa77cf3f5", 0x27}, {&(0x7f00000001c0)="c2c4c8950df58b48cb7125b9f1564bfc9871a7d2", 0x14}, {&(0x7f0000000200)="a0cb875425c6eca3d4f1556ae007fbf2728628f377d3e27ff7295370e328996f104a848fd6fe4da34d5314aacab2f4c6", 0x30}, {&(0x7f0000000240)="f5349bfc4903339a68034a1f3c1d8a677757f0a0893fc6193dac9c50c059effa10feb87f81680ba2f2a8a2dd2e9cdc7c440b50142acac879812104478572dc1918f8d2243190eb7085d64445bcf421f47d58fd6b917d5bea23598af7970291a4abbe217dc4eb3a80523b2f596c5b521910a0bd8e72595189ec44e347d7a82f14e703b50a7fc5b3054fef02046545fbba97fa0fdfb59e3454d3d4391018892b57c50075d2bba14fe9c50599e85b57516c05c837ef72b49f1381d4880c7c", 0xbd}, {&(0x7f00000003c0)="514e2c07fec9b364e254d8a2b226c3fde1adae5c24525f7363ea11d7c17bd6de4120cda588868e6a8962a698c961612d3c9c8a7e394310c9d02dc14d02f3ee69eb3224be80dcc783ceb9ace7f9931780884f34cb3a9ce0cd585dd498910d403b775cdcac8ae33072e699ed63ea60697cd40b7f0798561e84c3500b6603c46520646cd6c3395fb3e44a220b99291799fc3d2992b32544e2e8c4a28da02c7296c1230a45be2e8af8f09e8d008a09ab25a48bc1ee5778a1d43e3bd20c308b5188fc472e7e76474e6356e49afc", 0xcb}, {&(0x7f0000000300)="22ec8462472559404816618a41f951ee1345185d94edc33aeb47aeac1f8d836e43c89cd78472670244ddfead24f6ba48e11ce431fdfc865581467be942264f09606299c8f5a255dc4dd3c2a990f7f860f4dd18eab7551f7efa13631f1244d6d08cb2eb8449f5fe88ec0d661e", 0x6c}, {&(0x7f00000004c0)="e4151289f9ad5817a5e7258fcfae6a93fd9a6b5de116b6d243a19019dbaf382fc5053c3a79a580c7d30d88a0dd9704395c9494613e497f817c399b53ed94dfd671885cf3a7edfeffc1aa8f68ecea7b774d49f4f763b97a108c745daefc17d12286d58f31d926dbb658de4beb0ec2c9bdb7da0d1913abcefef4a4359d3bddc1e3f8a635a243416fc08443c7e7deaf3acd67cdcc079843a8410fc8e578e8e182667d853be4568679b544b0ceeca5cffeee73e3909d15c9266a1f250ea039a3b6901512ef86be55495ea28396192d0690510c62f2bda2c06f56d8df6d8a5e3019", 0xdf}], 0x7, &(0x7f0000000640)=[{0xd8, 0x10e, 0x0, "c4adf53cf31a8bd727ca6df353d3cee89c2f2acd022751b2605704974d72b1130007845830501adbc1e91f0cb6b969fa18db2b57f9c8ecb98ae9157f86a783e4f17e615ff3c2e6e9e8d6cad227477172b1b559800f3ad6b52ee3d1060fe6c3fefa865e40379fc5f97e252741108b7abc293aec6e65b734271b223956d71042175be4116539065dde65a46178962637a9c0a753d7fef3526af6c035b22f678ace8a9ec8214c757b40214bd9c6de080718f345b2ff32873238de5b7d08f4f312088481"}, {0xd0, 0x116, 0x5, "982d74717946fc708435069ae2d4f7b1620fc49ca1c4ac62b5b99db07515cdea33e1bf69255e92e2d909a9203b1907beba2fc3088752d285f16ba1a9ad732cb4b01f432704beffe34f3933e96c158da7df9b827a072ab39911cbc32837d3bf07db2b705f37f6c1cc394d354cd9bd6f758dfd34523d3e2b34b75c62b5ae2c3ff2cd59692d75e976c253d0dad1a03df549cd3aab9084f68c290cc1265afe23e25af31d4de227fb6543564928bea6d63ccd29351a4a6b93cee909d114163e"}, {0x98, 0x119, 0x9, "e56c35861ec61541c4e1af6b925490b37541b2ebcaba786369753aaaa968222e204a9a706d70f4026ebc0048277f96f1596b097c51a20f2055a4916f90ab9c8b52c0049ce41983334304b44a924f1a45b1d2ec5597adff7a63a7a409eb5ce0f2e4d6522efac89e18602bf9b0a6114264e35a17869fa8ace909b8500b2d50f83026297164"}, {0xe8, 0x0, 0x8, "48b29280adcded3cbc1dbebbc9ab0051817e8032618b72449e66c748ce2f2b0ad80c49134854fb889283560daa51ffc2b188229448d46a1c2edb6a256adddea8029c0e31491c9b2247c0afc38e505e7487b203bb2fcda5304de9ab5396937125eaa7c6e3f3869230322696ebc7b2f58a9eff53517b237b4c1b9d28f30698525f29ad4fb8937cf89178ca9a45f0ea42488273857c5199afc8b4ffc2aaacda6fa3e74856615b25eb2a9a2feedd22b77d4e9ab82bb0431abf68fdf331bbde98cd6e1040eccb572ad38dd92b861a02a79cfc45db7b630153"}, {0x40, 0x102, 0x2, "7e2bcbabb45a3513bce3cb5f5d81e2def09de1eb4f0a98a82c2ef4a3b9cace92c702dbe3c19ed9f0842ff474"}, {0xa0, 0x116, 0x7fff, "de80c921718348b1c7974c6b65424bdb6afcf8aa22d8d84c45f11407ce78180310e455dcff16f3a96f25b4d74567179221edda4e75a310c814182ab510e49f162a727448d5591487ac5a710b965a3e046844ab788de3c9bdfea7173c71f1bae56d7152cba32415aa39cb3e451fd48da9c10413eb46d773230067a39885ce2789166e56c351b2109d46"}, {0x78, 0x105, 0x4, "0501f6032e49bd85238a914036952dfdd8e7f3cc938c6cada8a8ab44de2f9006072754d9a4f3f6ad215176f0e8ce9e0c358695fb2cafba1d2e4fcb0e58caa1137d2f9e82a75b9e76661c22cb2a152ba0cca8840079d04909eb68a0ada7c882d2861349766a"}, {0xd8, 0x11, 0x7, "34a9bfc4f6e8c06aef96987a6a900341286e2a5ddf29a3ac6d9e99600ae9f3ca28f25ac8e91bb1294c2b8e6d20c4ed199da6e82d66ebd9954e263bc472018a249a4c15557a587ba798d782fe215b33e92e3df4d5ab95052d8cd296099fdd6b308c7aa7b8eea1ca47bb60916c7a4d68c47ffc1ca2e6c6325c6086198af1bb842c2a7dc8257f76c00e99ecb521f16f4ac532e513af27974f4a6185ad14a0347a9b03fb98721bedd610a079a91dc1725c2c18c58bdc7e6b93dfbe28cb24f7607b58840d9f79b40352"}], 0x558}}, {{&(0x7f0000000bc0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000c40)="fd20c8dd7da035376fc7fe94c2588c4cc0579f416aefb1ffd28c084c65590408c38325d39b32fcfa4c052709aa9af93eb11ee0b887ab0be51b0a53339088a9e236505bc03bc33ccef0ea79e1a22e46c61d88af895d556f5722f9cf73c6ccbf2a85743ca7d9b892149b3626154df2e2bd5671b6bf2deeb57910c515b4f6307f99ccf3e2d0337525eb7b941388ffdcfd0aa0c03c87722d5198f214e1e409d963daaf5280053492de4f89d8a9708a32bea17e120f4c55ebe733a5ed311d12a85e7a9f21d8ed948eeac4aad154381be2be0e073e2837d3f2c055f8e0ec190878261490df62", 0xe3}, {&(0x7f0000000d40)="ee4c116a64022fe3aef7bce9a087b836d125defd59cdb9648e44cae4139db46bf5db340ec6d31dd7092c35af30652424f615a6deae8f8472bd914db65bce8b2775d58a63cc3ee29256ddefb650b95f08dfa4a2f74a06393ba1006505f885ac7d582d3791fa3b022f94df68cc4c8870f6e16a1dbcf8d2ac4341c4f6bc0a56e4fbccd57344c4f989f16c8bd20a75b67823c27e7d3c", 0x94}, {&(0x7f0000000e00)="cfc568d1a0e720de47b295f9b67c72d7be65285891eaca919e65bc84f5fea48c41056c35fda0662a1e9bf032531fcad8d3025634773b9cb65ddf09ddf7f96e5ea4cf6489ab78fb26eb3a0e6f696032a73742aa8ff59b31683b26c147a8f2af6c0411fc02ddeabd3c017f92ec017fc9843805a0bc49ce03fa62504ede7ee5b16af362ab145fcf67ba1496583f68ef1451e58f0c0cf064895dc304e29055ff361de309ee40e5d7c8b56f857bc3bb7ee20a2076b92abfd248a49cc8ee7fa7253f9a0eab1b68cc35bb4c3fc70870c7efaa8192bfaea0deb9fbd7ee2c99cc81", 0xdd}], 0x3, &(0x7f0000000f40)=[{0x40, 0x84, 0x6, "50311c51bb2a388f011c96fd754696fb9e627b912a528efa300ff8de10e8741d0e84a4458d69d70d7686b2586f"}, {0x90, 0x88, 0x5, "a09b79b352258ece6c55a6fdd7a0d2d30822f4e487fdbb9976bde901c7e69797fe87ca711f155549727a3f040d4661406226d53f6ba6e9db654ad3851d566326d00f9e72c6cea78e27a1555b30f28b690fb1bd3f645ceb8e9a71a7cee588a3e813b4f23d4e0296d8b1da2787ef6fe32895e1be23ab2553a2473b46718502bdb0"}, {0xf8, 0x101, 0xaf, "8e1b19dbf2112d681cabba75c57e5bb0d4875b313406998cefeddd92e9da59e3a95423490668050953edf21e65a506c995a80e10d68a93b37c6e67cdca60a79254b73bf79847413097cfee1fbcd42fe0acd52de7caddb87764899cbb6b85022fba73bda96beae75fb23d19c819c005ceaa7fc80bd8727b7f3704ed2516635e9a88ec3c90600968c63cc31c6f388a129fcf83e41497ffdeff3b6bf9876fe902aefb50d80423d0923f27973817c7efb623d3ea1626a933c7bd6049ed9b715f0150f7f415c84f28a0883d586d0c4aab9754ffbc3391d544ae5da58f7b867eccc4c699be5ba5"}, {0xa0, 0x15, 0x3, "371fd1108eb0b7a5a6a42d39005af025c81746353e08ce57a794fa1f2ad8f4ee172658ac3908b17fda7959c060d2f04f6790e94f2de1c7593e95134886f51ac7d4710e018977a50ef5dee68e9e1ce27af83dd9316cb05ab6a7c9719b45e6d82c18f84c3e749b7f90aec2b7f5a3a1f59c8bbf092565aaea2d276e558269c5d4b61c1bff7de1d08987f4782c1188"}, {0x1010, 0x114, 0x2, "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"}], 0x1278}}, {{&(0x7f00000021c0)=@xdp={0x2c, 0x3, r4, 0x3f}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002240)="bab58d62526f1ce03d40dd0b9decaf548e5e40202ea50332bb94b9a7b49713de85dd10364e2f2024ef88fce57cb12043c3140db646ab5eec19c273c32086338b2f71518bde2578350745180d73f1972ebb550ec92cc8fab2da0446c426438efcf407b48129d146fc52c8645ff0515393a3b74e87f804631dbd3c8d8eeb47144a9460be97d6c328440dfc6d5e397382b1a0a7c74e10ddb4bbdd645090694159c5dfab7f915ac257743b920a6148343a71", 0xb0}, {&(0x7f0000002300)="26de3b7c07beb8f7f5a44060e880c729db3863007d917307fe5258f18e0ad8acb37b820d5512177daf0f5b6c2cd6256228178d0a06", 0x35}, {&(0x7f0000002340)="4050153064194c758d232a7b0a97e4cac0", 0x11}, {&(0x7f0000002380)="e9f82ffff868613404b99f6e655f09c640e7cc39b0d413170b0988c64be9970237d321731871245f61ba62ddcdf81382f532a6eea6e7856574944c7f734fcc06cf9b906d427bc45ab0554d7d73a6fe20a032e5c02d6c", 0x56}, {&(0x7f0000002400)="ffa46a239337f84384f21874bccf47cd1dde5c329697b369918791135275360ae4e39858c4be14f4289d81301a4cec653f1044dd67fdc73832cdf7326d403fd7836a1b305827a84003a8563b56831269b207d86a9c4e4ffc96e93d713b4c79c4767fff", 0x63}, {&(0x7f0000002480)="f0f3427c01e2960c328866816a9d08a220f011f3258c9926b1807802ae8ddae509bf71209339a603b1fb6046d84d14e90060bf28eb53362acfc72681a59bf6a068bad0505b5d9d3eacca411e5d7cf75279b91a305cdd70223975d324731eaec2834067490d95f95cf81ede37292f05b5fae437df23f914118334ad610705a766a4ef892a0b0b29f517ea7e03d304bceda8caeb1804863f751efc3d3e292ceeedafda55bf47139c89223fa4dcaf070f428c86a1c413471ac0010261d78510c9a9763947a2bedf43", 0xc7}, {&(0x7f0000002580)="93e0c9140ae401d7083554c8dc78380627b2d364639a88f6a98359d558e575461c9b778e22", 0x25}, {&(0x7f00000025c0)="95127183045135ec6df9ccffae2b4b43044b6a67428149cc8ddadfef48bf5b94aa9004fae6f929efc5f30f56e41dedb450cf8afb4fc26abe7de560e7005c97aa67386fa3165bbf8e5fb0d6418f6eafe00c3eba46158d9e0b5930e3edd031117cb40677", 0x63}], 0x8, &(0x7f00000026c0)=[{0x110, 0x118, 0x8, "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"}, {0xe0, 0x111, 0x20, "a2acececd61ca4de484ceea6d0a5bbf3f218cd9768fdaa815fc3aeac4ca38cc80312510ea9fb228cd3a1f9f4ed3e6457e63f3e545a98f883919b0e975b556de26e41cd2cc5bc9ea0ccf1d156c8818e21e94dfd0ecb524cb9f595dfb42469781fd37263f19a2e4e98f6b13ecb0ef196efaece1d6d454ce3c83b28d2eb41729b7d9365324416100689db9fb56cfdb845ab3367cd7dd11467115e917a237d4e4e389aed519a8ece4d52a2d49f69f6a1ee544e802950dbf50d0d9bdc7f8975a230769d1f0e793a3e88b034bcb9"}, {0x28, 0x117, 0x1, "dca2fea3db1c5bddb2d6b689a02739a9650c"}], 0x218}}], 0x3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x0, 0x20, 0x8001, 0x2, r1, 0x0, [], r2, r6, 0x3, 0x5, 0x4}, 0x40) 15:53:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xfffffdef}}, 0x0) 15:53:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x2}, 0x0) [ 1375.096886][T13971] IPVS: ftp: loaded support on port[0] = 21 15:53:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2d1}, 0x0) [ 1375.256838][T13993] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1375.277761][T13993] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1375.292811][T13995] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1375.332008][T13995] device ipvlan774 entered promiscuous mode 15:53:37 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000009000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1375.439596][T13997] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x4}, 0x0) [ 1375.481919][T13997] device ipvlan775 entered promiscuous mode [ 1375.634144][T14020] device vlan3 entered promiscuous mode 15:53:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000009c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c8, 0x0, 0x0, 0x0, 0x228, 0x228, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @local, [], [], 'gretap0\x00', 'vxcan1\x00'}, 0x0, 0x208, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @empty, @dev, @dev, @rand_addr=' \x01\x00', @mcast2, @ipv4={[], [], @local}, @mcast1, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00', @dev, @empty, @dev, @remote]}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x228}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xe2) 15:53:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x300}, 0x0) 15:53:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x60, &(0x7f00000000c0), 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "86b4993c52142dd7", "d295a7dcca0e639acfcdfbfe6bcb7771", "90dd24fb", "4bc7807aa9bb93d3"}, 0x28) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000058c0), &(0x7f0000005900)=0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x18, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x5) 15:53:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x8}, 0x0) 15:53:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025950535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:44 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000a000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0xa}, 0x0) 15:53:44 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000010c0)={0x3, 0x0, 0xfffffffc}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x2}, 0x369) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) sendmmsg$alg(r3, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000040)="14211af6cddf417dcff48dc4e39b9332ad5858feba4538f8438378ae7e049e0bdf1b749638738ad05de490bcf7c7e8f1dc1301d98f3d9e8aca3550edb9aa360fd0cf028e3e876ccd81a8ea9134048abb5475a31ebae19404d4af441f9b42f5e0410d70fb8d2052cee8ed764e9c6d84024579252fbee1", 0x76}], 0x1}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7b, &(0x7f00000001c0), 0x8) [ 1382.626998][T14064] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1382.649775][T14064] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x402}, 0x0) 15:53:44 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000b000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1382.709736][T14068] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1382.793752][T14068] device ipvlan776 entered promiscuous mode [ 1382.866331][T14068] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1382.928612][T14068] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x300}, 0x0) 15:53:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_virt_wifi\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010000fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002000128008000100687372001400028008000100", @ANYRES32=r3, @ANYBLOB="08000200499656d98fea7d716f49d33fdfae8dc819e0bb40d142e540ce", @ANYRES32=r1, @ANYBLOB], 0x40}}, 0x0) [ 1383.516470][T14071] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1383.535033][T14071] device ipvlan777 entered promiscuous mode 15:53:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025960535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0xffffff1f}, 0x0) 15:53:45 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000c000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x500}, 0x0) 15:53:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2}, 0x0) 15:53:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'rose0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x34}}, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x34, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008081}, 0x68000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={r5, 0x3c, &(0x7f0000000080)=[@in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, @in6={0xa, 0x4e20, 0x3, @empty, 0x3ff}]}, &(0x7f0000000100)=0x10) r6 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000000)=""/7, 0x9}) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x600}, 0x0) [ 1384.433810][T14112] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1384.444092][T14112] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1384.457225][T14117] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:46 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000e000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3}, 0x0) [ 1384.524190][T14117] device ipvlan778 entered promiscuous mode [ 1385.007543][T14112] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1385.016875][T14112] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001cc0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xacc}, {&(0x7f0000000140)=""/85, 0x981}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r4, @ANYBLOB="78e99cb64421c72a21276935e7fc7258831d076d0856f8ccc8403e982ea538a0dbe1f7354a8acfa8693c05405f97d7de0b0e42b0e4164ed63a8acf67c84860890d6b53bf018cc5759bfa7f9bdf0cc1b93a4828635ea4f9c30268491d3fe992d93a5e9c98e1d9778367b0dcd1401ae495af6affac124710c64fe2146d8b4976f249d0961e29d804d461fcfb9d91d0f986bc50628ed13d395e4453c8"], 0x20}}, 0x0) [ 1385.078939][T14120] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x4}, 0x0) 15:53:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x612}, 0x0) [ 1385.198242][T14120] device ipvlan779 entered promiscuous mode 15:53:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025970535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:49 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.current\x00', 0x275a, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f00000015c0)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x1c, 0x6, &(0x7f0000000300)=@raw=[@alu={0x0, 0x1, 0x3, 0x8, 0x6, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x52}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x7, 0x2000000, 0x3}, 0x10, r0, r1}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x4, r0}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r2, &(0x7f00000003c0)={'syz0', "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"}, 0x1004) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'syz0'}], 0xa, "f09e0893867dda5f0ecced415f04c6c0e2d04cba43897a41363894c436f287c48d4cd663c70bb5c9ee3c2bbe21ab554bedf1ad56f817703fa82f06c39928a620b6c4da3d26005d141742726a8942912d4b7aca1543a4057151c9bd9538102ffbaff760c753e922b1b0c0213e0a721ce060c3996f0c40c1d8b809722b90a496d6dc2b1706e07d0fb27cb7415ba1815e9952950dab1535c1e3278b87de79f5b843eea78dc7906b83b86096e8636f"}, 0xbd) socket$phonet_pipe(0x23, 0x5, 0x2) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x5}, 0x0) 15:53:49 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000f000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x900}, 0x0) 15:53:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa00}, 0x0) 15:53:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6}, 0x0) 15:53:50 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000010000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1387.839647][T14182] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1387.857004][T14182] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1387.875355][T14186] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1387.896917][T14186] device ipvlan780 entered promiscuous mode [ 1387.957088][T14198] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1387.966417][T14198] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb00}, 0x0) [ 1388.056074][T14201] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1388.084472][T14201] device ipvlan781 entered promiscuous mode 15:53:52 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0xfffffffffffffee6) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000040)=0xff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000740)="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", 0x19b, 0x44, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="216addf08e32b751b6e26a08fbb6473509f7bb367468f9120a4796c5a61169f3b3356ddbd2f46b0db5f6ec3544278ec903ff1589c646722aca51a7e2bb6f968ba4ca25d3786f96d1dc6675156c786b99cd2912a00369e126e4937f86836dccb544d978c595560c6ebe36b39193a17138c1bf619060338f72aa4208267b13ed025821a6c50043c45dd116e36c12d3675c5e91e4d71d3fd4d4d49afea8652077fae25fd3964b9e4da427733706e27b0ed327f73837bcfb1e8de35ed85f9508f0c6a957f0e8e511aac6ac14bbb9db6ac39015453538a2dcfe74977e5fe5f922eb34548f3d3bd125a02caaf23b0815239bd3", 0xf0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x4, 0xc0010103, 0x0) sendto(0xffffffffffffffff, &(0x7f00000001c0)="da6f0563a12bcc9118", 0x9, 0x24008000, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$can_raw(r1, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000e40)=ANY=[@ANYBLOB="baa21c59c4d35220ff001950ab229af401b1f2d6d6ececa600e08de6d17348b46d1de5497bfd0ef4e88a2064796288fc7000019ea0d4ed676657ada69336b46be7e43c94e024f42edb0a50a3359ad1d30e04f41669d9b8cc8a88d397340e9ad966a46a9203cfab8bb8ac1b72daafe04569b4b50fe8783ad192bac18ac79a6103e9a8a68ab50435aa710220749703d4e4da7e2a61444151a38069fe9040f7ad9271ece37ab0dfaa50d7f25d5306398d0e9113d9b58c72ee21984afa7f0000000000000000000000f37c609fb167740f2d3c210bc55667e5417d754481e5c814ce82dfbcdd12addddc0f03cbe3c15b0563355a3b064d01b59ce51bff3bc9ab6790d0034ecec9da78c29dc0d9e17e451b98444481af0866dafead8c19c036d1b6f27970b05c5635e57db63d79cba0e894a6033344b38936d45a3e00000000000000000000fea184446bf1199f1161f4a67c1c9ca6c7c708aea00818008de67f609eeb535c065bee1755dbfc2d6f5b87e549fbca2566cde0f43db3c6535437f4265239"], 0xc9) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b1b21a95ac816d2709ae42a323d1feed8a99f158d740dfe3e44bde933dea81d1c7c36e91ff7f3a3a8bcd1bb4b7763add5ea73a74067ca0bb8dd3b87e979cac7131cf884b59dc125090a4b9e13eba05778a03d93d7fb1f0c6c3b6e9f396f9cc58265c20aefadbdafe954fa47e2f584d8f28f7015531e226f44ea6329e3b45717551e97e467376ba30ca0d94db946bdafe34aec8bae7dfb1081b8dcff487085595a1a4b6de75a2da5687c3377d13ebfd9cdc97c402a7e5fb64a84a913289db3758f44d110efb7b7d8b6cb864b770d330958a774790b6e228d14cd93a69fbc6d2b4172389fc7cc560fb84f160a06b00443f988c0f3b45d0166ee8748672a4d0ccaf738a2cc107ec744cc305fc7e35b7e2c7f6a5cf9a8a815310095b4b2bd3689bc7da7ac34612384eddbca5ea93c65a7014f3e8de6fce2b4deff60d3caf3c4a766194ddae9bb6e460c913adbf662a279a3e25037c39fe670c1d8e1efc43cc6db37ad3075cae697ba26f91485fc0f77d37d2e7dd379d769849c000039b00df0edc08be6dd60c5f3cde09e49c6c9a947c57f658fc25522ab5d56cc15f06135159adad1c28e9767722b5bc0741487c19de3a7a9f98b98c895798fedb651cda378d165a418e39e55a83c924d7b147094d6feebcb67218de5c1caf0f61f57ab98c248da63f8cea02eb0ad231d07b397b61a1cfc384ee8ae"], 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540)=[{{&(0x7f0000000200)=@pppol2tpv3, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/5, 0x5}, {&(0x7f00000002c0)=""/138, 0x8a}], 0x2, &(0x7f0000000380)=""/30, 0x1e}, 0x40}], 0x1, 0x200002, &(0x7f0000000c40)={0x77359400}) 15:53:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@ipv4_getnetconf={0x2c, 0x52, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x6}, @NETCONFA_FORWARDING={0x8, 0x2, 0xde6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41d0}, 0x20000000) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x5, 0x2) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x404c080) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000900000000000000000000000002010000", @ANYRES32=r5, @ANYBLOB="08000200ac1414aa"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="20a300008f24b746000000000000000002010000", @ANYRES32=r5, @ANYBLOB="08000200e0000002"], 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r5, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r5, 0x2, {0x0, 0xf0, 0x1}, 0x1}, 0x18, &(0x7f0000000140)={&(0x7f0000000040)="e10578adaa7a7ff7cb8269f94bbbdaa1d301906d28de182295acc66d42ccdd9ceba9604d43b5638a5b9ffc142c9adc79f2154bad28bb65b2a6e390f95df1d38dfbf84e158154d41b599085abee7acce502a5d9950afdb6cf80ea16f74e7ab5b3b4755fd9fb2e1a76979eabab35d22b1aefe344622712c3eebc1cae376f7d88dbd107fb185ac7b89c1e65171e2de005d95383eef4204ff99661e2c3af8e82d19a2471c3983bf3b2162b24547d73d524cf7e1c258004836859e158eb58df5bcd8d2be8", 0xc2}, 0x1, 0x0, 0x0, 0x400c845}, 0xc000) 15:53:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8}, 0x0) 15:53:52 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000011000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:53:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc00}, 0x0) 15:53:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025980535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9}, 0x0) [ 1390.053266][T14232] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1390.068861][T14232] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe00}, 0x0) 15:53:52 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000012000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1390.165200][T14235] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1390.205715][T14235] device ipvlan782 entered promiscuous mode 15:53:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa}, 0x0) 15:53:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$MAP_CREATE(0x0, &(0x7f00000047c0)={0x3, 0x4, 0x4, 0x10001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, 0xffffffffffffffff, 0x6}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r3}, 0x8) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 15:53:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x2, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf0}, 0x10}, 0x78) socket(0x9, 0x4, 0x6) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002980)=""/4112, 0xfffffde7}], 0x1}, 0x0) write(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) 15:53:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x404480, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x1000000c8) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) [ 1390.674564][T14268] IPVS: ftp: loaded support on port[0] = 21 [ 1391.641080][T14269] IPVS: ftp: loaded support on port[0] = 21 [ 1392.096830][T14235] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1392.141263][T14235] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000612000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1392.196710][T14239] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1392.252807][T14239] device ipvlan783 entered promiscuous mode 15:53:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf00}, 0x0) 15:53:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb}, 0x0) 15:53:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025990535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:53:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1100}, 0x0) 15:53:56 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000013000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1393.756376][T14296] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1393.766270][T14296] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1393.786783][T14299] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@private1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) 15:53:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc}, 0x0) [ 1393.911822][T14299] device ipvlan784 entered promiscuous mode 15:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) getsockname$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) 15:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000000)=@nfc={0x27, 0x1, 0x2, 0x2}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="61236fbf4c88d00b5f1a7dbd6d9a100ce31ad509c1844cec58c15a651f885b7d67d64833cc12d71aa51b409a2d64f6fb1f70bfb164a73eecac8d2f75b0fe74d39a5286a776323b6fc483bd87fecee578aae74b76e9cd21c60e7991d98fe6aa2e0041779ee35796819cc7840fcc29e7f3eb78289769b5ebab23be076d1f12713aee4efe6ca61583bb6db90f3d40a581b974d8f4c4ce3f379529f2a165fe92fb5c8ab71435679b755bc718d2506b34f07bd4", 0xb1}], 0x1, &(0x7f00000003c0)=[{0x110, 0x105, 0x5, "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"}, {0x50, 0x10c, 0x8, "c1b3bc0ca68b6679291a5d503b01b89e895ce114a8377c45823fe67a85b1807594c3cb92b1e017232662379f2a309f0886b2d36a3f3591ab42a95a4202ff"}], 0x160}}], 0x1, 0x0) 15:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000100)=0x1ff, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = accept4$netrom(r2, &(0x7f0000000000)={{0x3, @bcast}, [@default, @null, @null, @rose, @rose, @rose, @netrom, @netrom]}, &(0x7f0000000080)=0x48, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f00000000c0)={0x3, 'batadv_slave_0\x00', {0x1ff}, 0x5}) [ 1395.076727][T14311] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1395.086587][T14311] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1395.105544][T14310] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1395.138687][T14310] device ipvlan785 entered promiscuous mode 15:54:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@private1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) 15:54:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f00000000c0), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x4e22, @multicast1}}}, 0x88) 15:54:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259a0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1200}, 0x0) 15:54:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe}, 0x0) 15:54:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000003f000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1399.870566][T14363] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1399.892501][T14363] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf}, 0x0) 15:54:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1206}, 0x0) [ 1400.101165][T14370] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000040000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1400.152475][T14370] device ipvlan786 entered promiscuous mode [ 1400.233188][T14370] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1400.283473][T14370] device ipvlan787 entered promiscuous mode 15:54:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x3c}, [@call={0x27}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r2, 0x8}, &(0x7f0000000080)=0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x11, 0x5, 0x7, 0x5, 0x81, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x28, &(0x7f0000000100)}, 0x10) 15:54:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000005040)={&(0x7f0000004f80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005000)={&(0x7f0000004fc0)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x2}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c80)=ANY=[@ANYBLOB="140000000301ffff"], 0x14}}, 0x0) 15:54:03 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'bond0\x00', {}, 0x7}) pipe(0x0) r5 = socket$netlink(0x10, 0x3, 0xb) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="467800fafa01f18d0261c95a57a1e71f8008814475e0e787300125bb7807780aa8a71bb7b8904d8bf38cd914f65eae337abf515f15658d6c86b79a65dff358d5ea1858beb726ee54c71e7ae474717e044437f9bf7b13a359f02f5c8435fad26ea41e5a58ef5a6ebf12b26f971bdeebe5718731743bb9b5d430fe98ac9e2f3784de90acceca3ef49ef5a497416e5c0b82d468ec9bffba2c92f10102970c453c4c3f58a81397127531077f2f006610b3add58a9ede2bf6a0e4dcf85731331f972927", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fbdbdf2502000000"], 0x14}, 0x1, 0x0, 0x0, 0x40050}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r3, @ANYRES16=0x0, @ANYBLOB="78c9449f1db21dd7154d27c59083f788d3e4f8af975bd005feb4f5bb728e1e0769af55273356bcb92dc631f313ff3d4bc7f374b4591e623f97ee15e4b7ac6fbca1738f73ef4a7d0969bc91154f22bfb609c1f5dbd089f4a4b12e049b143ec3b40a1e704380b8b98170e81ab7928aecd95017c1858073a94a97c90d37e0de24c851ca15c65a704aeb7070ebf00f18208a398aa9992a3b84b860c4eb677f3465171dd6db7ef7aaf6870bace2de48cf3b66ae5c586821a3d7d706756a3813d7658ba33ec74a8cc8"], 0x3}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001640)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00002bbf7000fddbdf250a000000080004000c0400000800050005001800028014bcf567794e1e3e1a000109000000000000000000000000000000010c00018008000900cede8b08499dddbb330c0c76000000f0d07f34b4e5f316969d9753f0e5d8ccf538d18d2628c730fda38e1edfa8700ed1ad25deb61187d7dfb19a9e3043067d0c372f9ac53033"], 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100), 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0x1000}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 1401.188137][ T29] audit: type=1804 audit(1591890843.439:674): pid=14406 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/957/memory.events" dev="sda1" ino=16100 res=1 [ 1401.259146][ T29] audit: type=1800 audit(1591890843.439:675): pid=14406 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16100 res=0 [ 1401.357272][ T29] audit: type=1804 audit(1591890843.459:676): pid=14406 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/957/memory.events" dev="sda1" ino=16100 res=1 15:54:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x10}, 0x0) [ 1401.577639][ T29] audit: type=1804 audit(1591890843.829:677): pid=14412 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/957/memory.events" dev="sda1" ino=16100 res=1 15:54:03 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000060000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1300}, 0x0) 15:54:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259b0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1401.699370][ T29] audit: type=1804 audit(1591890843.929:678): pid=14406 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/957/memory.events" dev="sda1" ino=16100 res=1 [ 1401.821398][T14421] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1401.833245][ T29] audit: type=1800 audit(1591890843.929:679): pid=14406 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16100 res=0 [ 1401.869045][T14421] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4, @empty}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @private=0xa010101}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x18, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000003bc0)={'vcan0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000000014002101000000000000000002010000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r6, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmmsg$inet(r0, &(0x7f0000005000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000040)="78e15f14520678b64748f4a2ee66ee0d9642e1bc2fbb659fc14896828f5fb7830dce4010a1b28975fae678584d091b7937fe6448bba47d5c5f8c9138f04e76d5de1c981eef57da2bb27e13b8b4326072839587bc453ce5c1d4de3a7fcc69e07eb54d359133ba7f0da963e3c790662cb856", 0x71}, {&(0x7f00000000c0)="14e9", 0x2}, {&(0x7f0000000100)="cbab29653d24cda89b04d70c5dcc3649b869f66602fa7eb7df162132fdbb42ea0d7065360c1bb35590e5b401275776078f7f1961f7739012", 0x38}, {&(0x7f0000000140)="6894a648cbd2851e368819747f34339e57549071c8e841b124c46092e86a84c7a1abd8dfc39e7827e8347c014222af0a760c98d77c894662f4d73c969fdf0d8446afb979512c1bc6ab53951a6591db4e47499a172d74de8ee9aa27e8a6211e01531b88fe8ee85e0c", 0x68}, {&(0x7f00000001c0)="aceafd8d1717c7439465", 0xa}], 0x5, &(0x7f0000002a00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1e00010a010102000000002c0000000000000000000000070000008317780a010101e00000017f000001e0000002ac1414aa009404010000000000"], 0x1c0}}, {{&(0x7f00000002c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000300)="d6be9dd7bf7c80f2ccb7d331d9cb5776cb1cc8f4a005f15cf230e73ae4ab239b2a269c340e91c9ad9aee8d82b22012", 0x2f}, {&(0x7f0000000580)="9d8728493f1cddf81f95c7dc7f0b27e953c94a3e7345eb26c26612612276ec9d90e846abe9a5eb19db5f6c49cdcb75dffaea80269251eb34ac2a5b09715d8e49a63fdad279a203b9f2b0a73354511dabdeadfbcfd3fe6340a72e24a3ac8e866c09ace232614d867712f995d8d7dc3ff71eeb5793d885be38427337da12e6e0dcfec51c71a6c3a0d34eeb7f18b3479ae70b473c88f3a78a2d414ba5ea04ef4657e1a47a27caf665d51f4f62f7f451caf01fa131fba6a922f4c3f18fbab1e65dee", 0xc0}, {&(0x7f0000000640)="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", 0x1000}], 0x3, &(0x7f0000001640)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x31}, @empty}}}], 0x38}}, {{&(0x7f0000001680)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001780)=[{&(0x7f00000016c0)="1aa2416cc3e31fd6f26543343295f01c7cef31bb71d645ac24b363fb8b7ef59d61360bf3caa6a935f481b2ee8b77cadb8f9d7070a5fab84af9176c31ca6e7dc73d88ee1dd6fc36cf2cc820ee1ecdf7f21abf9d6cc9172f68898747eee9cc38d50b3a45ec1036a9cff8f0f02f658eca9c7bf76cc41f5a306423190075011efc51e5c86508abbdd5f385236385f93b1da14501ea520a89f7e0981cca", 0x9b}], 0x1}}, {{&(0x7f00000017c0)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f00000029c0)=[{&(0x7f0000001800)="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", 0x1000}, {&(0x7f0000002800)="c21ab015593e74687e735c871d2e8b4e49e39df3a478df94a533aa5f5c402424ca6afffebea4df5ca5085e94559ef0bb1ee97ee6d15b7325d3d5eda67f7920edd047f9098b94de71e9841492ae206976e1194ef0552d3181b2b815c0269255a7b75e50b5bfc5f8c161c9095a82657a60572614fe79e5fb98446247f1e6f925a85e0c038c4a6595b734f5d658aff22f7f815cdaedddd41b944544432ab119cea45de83ff8d8a571ccc41b", 0xaa}, {&(0x7f00000028c0)="f637e35c59c34e019f0148290e36c5b40f8f5478fd753a6826a6717817eb7990f505bb0a00af3d1b364b1426d7323f8e4275c34566ab0415362e1e87cc707d76bc38c7a70482dd8fe5308bfe5550940781b0a678e94b98c30f049dcdf2a053a842b0b7010aeb9c594408a8846ed788992091c8cf33b3ab296e3b7b337694b0fd3454f871596043b4341d9f08d24868d5c1a9f48714b620c38516ed2be09f9755719da01196d8d46176f14f8f2cb626829b79867aaeedb7e6f55ab67ca48188b44996cf26f23f64f87cc034", 0xcb}], 0x3, &(0x7f0000003c00)=[@ip_retopts={{0x78, 0x0, 0x7, {[@ssrr={0x89, 0x17, 0x43, [@empty, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x20}, @loopback, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0xc, 0x1, 0xf, [{@dev={0xac, 0x14, 0x14, 0x41}, 0x50f1}, {@local, 0x3ff}, {@loopback, 0x9}, {@local, 0x80}, {@private=0xa010100, 0x80000001}]}, @lsrr={0x83, 0x1b, 0x34, [@local, @rand_addr=0x64010101, @local, @dev={0xac, 0x14, 0x14, 0x1b}, @remote, @remote]}, @timestamp={0x44, 0x8, 0xfa, 0x0, 0x1, [0x80]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0x24, 0x0, 0x7, {[@rr={0x7, 0x13, 0xfd, [@rand_addr=0x64010100, @private=0xa010101, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr=0x64010102, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x168}}, {{&(0x7f0000003d80)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000004ec0)=[{&(0x7f0000003dc0)="6c04409e7e790926480a137a85d2ffa00121dd082ef64f92d648f0c17e100012792bdfd11d535dbf202691e68ed900310f6f3a9324bfd8baa05f34f82dd116bdd0f1766badab844b0086f3530b6324bce3ca6d968e9d584fdd004999d69eb6301b61aa1b8a67c9d4554d7990d5225638a3c08022827a5cc4328669a93b386e80d72f23a036c52ac0ca8035993d6ed7d1061c13cf08b14bb331c05e98d94f315cef39dfd358127575c766c473b50a0b8ed937d29b598a5024edabccbea9a491df75847b097168d0fb09eebe501cef17d3f0b68000675950d259beb52a411f6a019edbf5e4b659c17f1dfa18e1c8c37947162288489a22308fa0ad610d4a0b24df073cf5424fc8a42ce335b1d4d3413c77f64b2c611966315d8bb7dc47d8a3d30d97ebbce38abd4ac93c4b0aa772f61d21c2412c94df764f91aade5a346d3994664d590eb12ba480bed1adc8eb5be15cfbd232e8d802c73551d314786564dcbbb6a723d98047568a2c8029ca3628992d04d6910e2addcc6fd31b76ebf71349c8525f0c0438344c2aae8afefd218fe7cdc2756110cb044c4566c9f786daa162994befa6888d6a37f9c05339ae5f8495ce2d54bdc1662a7382881175fbe36232a28055952aafe5edf18f26f600c7d3ae7a77cc637b121b4d404f3acbc3e42752a8da26d53b8e975e989d0b430d541700ad51eaf478403e5d4fe79456445fefe242a1dba1b812245e00cba65bb8ec15ddc2e1dd497aaf95ed3b845da613d77e8c44eef64a390f1ba3d33f004305ca389e201cbe1e448a036817b3d04c3960db727fdb6fc33bb13b839896e32a2471b2687a1e999a3767eedfa9141abf73d30e7888c80013d067520ced7d5be78efd38637dbdd8852c077696e9607471eb484729aba730b6632b7e3a8c8ff9ad5c7ad1147bd7c299a028f70d06cb0ebff62af2a6a59db4eccdbe77899846ecbd4a923dc51f7c165c3c162ac286d7c19cd285fe3ac5ea8fffd84ccef348d8d68b06d005b96a4640d6b7ac2942b1241590a03c00412f52a6ef03b1d7450d0bd070640152ff24aff73aa44340e211c95d69dbe7a4495d9c8bc9c8d152b4d3164d59c9f969fa711cd8ad3d119d7583ee7773196290a7bd37665852eb1765e845731bf630c7966035a5774aa1686b762dfeb66d46e9a3a0bef8b403fbe3c4e834ade92e022354ba96fdf70cd6d46b12394445386e7cd648815a8fdc8630930c8d4acb9447154af07f142c75e9ce83697835372e67a00b7014a99568b7c5c16025ac7f185e3e644a6de85d4b42a1cdcc366e53e2c9b3667ac831d04acccd77cbd878d6ab510b4fa178d09dc5cf85adda6b5a6523ae6ef97cc79ff0dd836db5ee07018bd3fb1e2b3f9c7b9d29b6183ec6634ec2821919ce0bc953440fecf854f13c2212b13023cd04a4b4b6bb08fe1dabd702564a0563eb4b13557fc70e7a3aa365020cc8607c7377b25a4c30f244d53de48c483c2b2c0c7ac7b1025c23ff8f04a9e4783aed110b1e899be16a6d3858b4231036ff1e836f70860ae006e2ff000881710b0b854797f58ab370f4425832ab7c8af2481ee565f59538b50a3034d436b994fd314d4c3fb725cad43e71736b1869335da312d35a38e7c94e3b908da2c36abc3b026706c0282f32ed206c1fdc743172e6dff3d1be40b931240e86c63a64b06192c494322e841463683739ab768ce597eca9b9ca9418a28ba00517dc722a3653e9625b12ecb6554cccf7541a57166378ecd31a24cad27053dfc9a8f1a4cdbf11aa3c532e95a6cd63f36d06f9fe1ffffc193da3d6c86bb99181743392966398954de887cb836762709196f2d101126401d591c79b425d06b13298ffe68dae136f921842e59753bb9e69af8666b0b31a3984b43b2e415dc4799f9242b3466385937537521ea71f67c1af2346c510ca66eb4df3afcea43480547b4247f62c49f9d554ecb1195782ce4376c7a7a5b7c3ae2cad60c2f409771e7e1dc056d75cb18b842a8e6aa9338fdd5e14efa4fc03d0c2212982ec0aa77f20e435e803310711221aa1e902488b553db13dfae3f2d973a9f69a00406b7bafdea33fef67ccb703d6b12c33bf03ba132cce008ad39b46eb606d8151036783005feab583bd157b7dc3e2914b127f6f38bbcd9f216b75bddb3c12f374f0baa95ed79dadbf3b7ec4d697d6a76a49f378403b565651f9e06d02bdfdb8fb5780474a07524e1503a7c00813efd5d1b0f2dbdfd9a4dbe8b13dadf1fcd5f2ac3211f061a600ad55a8da57edd62debb5d70833e6117b34a7915f5f1e66dbde7b9b3d69bb74e688be9e806875cd73b4ad702346568ecd856e871d3310d541127f18be941e34d1a099c637aa61a726679b72cd139312ffe98af8af8c7fc1c2844911da19ba9abe64f6efa5058541ce2caec983ff313391d9774136dd839c1463bfce683e208df3bb6d2eb8299208a627e74d8023a17ab3e2b163d3e5203734543f07193ca1dd7b0a9018755fb0a79b70e857c48fb3334d0a21a29a89acefa9c1841cd1bf2969dfdc25e7a6d96e3dced788a61e3ebec140d5e76ab20aaa6e847f6035dd0b1bccdc5c6e2d6c0ba355a760130e43379c96d34aa22f5abe248100c3eff67bc44b33b86d83d9560b6c02a61146dac8b7bdc4996db44ea7f957e9ef6a8e8ba074ec7793ef673928c2f7b3b3c365461ea5cb2c067c7a90a092cd77a3047b48b3804c08c166845414cb4680675a5465af114fbc9d80260076ebc49b2cdaa2c9b32bd70cb2922c3e3f13111237f9d667b9f9807b4ae1aabcff6f6b718fc1dc7d6eb78086afd3206d6d80d659f00015d826ea0c6403ba6313e67bd7beb507e9dc57f7411f97733989bf8470a561c2bee83ba91afff16bae8c1b4521d2d01d5cf3fe44b09769350e53a9abacc79093c4cda726fcdba6d9bf18c01a8264d7cf17f322ce1d6101303db421b5e15b9bb83f64f0f138e9cc672f0973576b10d7f8647a914396874c5607b7aad88107124bd56f65b37f19d2d9d8f99732477ff61b010084268f5a7258a933137e912d915ab38104e1af43cee5e947a62a80f56baf1ae68d68ac1e7a1c802250a8a6bc4c74b56e249259f0e3aa17c20105c71c73148c655510b74f6af328005864c1f186e1b2aafc9a3d524059248b9d5d79ecf1b29514d1746e660408802b25753dde263c32ffc3c5464d0b1d5a3ea17d55176b7019d36c441edd049d809abe4822fd25507ab7efea0a4109226ce8153e46322aabd39801f543d864e85a5391a187effe7fe7e0f230774170e07644302d48c02a50622c0bc8b3f097140877415222298bbf1c9817c348d044b393109942ed15afdbbf58a091ceb3f35d7fa56924ff0781c050280a4477e4926ef9a14157c72bc99768a62e8f1d5ff6f8c17fd2056f15567ec2203f42e8cf3059c35b3ebdec16adf190918d1fad8c9f3c1356534a8028567fbd5e1d2aff80681c4bdbe07529a67f3c6b30326fc5125d67846ecd6e086e2eb9ee551d12d551bd1e42cffaaf4eb15c156d531ee912d042a8934c4e95102cb056f8b3b99da174e37f9820bef2ede0e3a285e5800fcd08b390726f09e7febd71c0d5c8e5bc01bc5e2a9df78583e34ed7c71a2ee2c7f6bcd43560abfc26517d2c01138c9182718dba0ea459c3fd1216b1dafd559873b72615914ee3c4068738c13f288816182cb7aafa28eef31811d831759b739058e3e0447e3c52950ae74fd76ec3fb01ba91bf1ea2ea9aeb8af6cf25ddb34f6dbadbe019a0c1a24ded1e58be8d640fcd2b6ac438b5108299556a47e46e72e4ee5ca4e9006d0ee4111f1888ceec568082c5097af3cf4586aebe5a5820baf94ea2b4b24bd76fd4f6b3627c3bf255abd1e4b28898ec36601ca015eefe8a30ba727bac6d47a96751554d8bdddf0c10977134ce2ce0b62cf03a77ce8b7cdccb3d861c66bb1b9163a2e9c964ae3a559910a977d900b1b2cb527374d10471d1fe262ad99c0c6baf872bf55b47756a308a7217c8201a3716f8c1fd0975124230c115e40100e976963a3ac9cf01dc3953e3d9c01bdec0c24470cff0611a1ef2a8da1295cc35f530552a95e63715153629ab2c8b5e9a99ec02b1665191db3c11faab07c5f14593f6a878f67c3c737af54f0dbda680e4fc4cc190e5f1d095ae48a820b96fd8801b01d9402d51d5bb7ff606010789a7362de89c937da826fe34c8638e45f6125078fcd87274afabadc6dc1871e30493199844b9d011154d7b8d45d25afcda6002117e90aeb633210f2b457d4c50f9b4637c9da16cc28f133aa18ad19ca12491e25acb1cc9834384f8f6e1fb99295ab11be72438dc3f835ef20b2e76c0ca43193dec5e1936391fe27c40322bc053433caeeeca8af25725a5a9f9d17f9ddd9100daf05de0aa440f931aa2c3992874cf82a275ccf52e5bf8bcbde1bfdbd9c859d0e8e67452b6dfd9d760d890b27ea3f751cef1545bf3211b6a1a64edfe43d90f5255576d22625d6278e35969120d38994762d34d054dd2b9794f892ccf4c635619370b11dd1074aaf857ce6f87d1a8cf870538c5fc022f2069e693b06ba17597e28b167266d9e613b20e4d0b37278947b1a410979fc20d5f39a27decbacbc150be6ef9b2e57a735e026bd34cd2376ac906cbc64a34a0304f898c5710b4ef303e55584d7c0aaf51d3ae2cc37077271c23e99a5d4d9a614f3102df50179cf5e7cb0f6367be940cd3f2e5db2efd842291aef5a1d5d8957a52d935d07bca62e633cff0aaf69831db47a5b1838905e1160f11602dbaa789d1e5bbde1e967e8ed6af91363ebe06309817245c6af73759eb834033d09a993fa52a54abdcd1aa8fd9a87d945e39a1db86e97d62df859477715ba12f6c8d6e66e36066d88a26892a28f2399930d969883f16a2ba5688dd0fa90d7e34dafa5081ad00d6c4164a764a9a6775047d368df091e867367f1dbc5b982dd3317b781923cd2a77eeef1f48b63eec7a8c449ab90f953e49d2b497ccf978714135babbba42ca6c44f4b1b37c6c8ba7434a21cc9f8b62f2060a09825d11bb79d8758341e910885778d2e2f426febd1e2f74629735bf0f10fbdec9bc68897ff97ae5a8a8218ea521206d7220015880fcf2b0072065864bad74e96015f816b2dfe8336c479704f36b5bdf520e5aa2833ba0f4baf8d6700d146ab4d4ff9217b73161ac1d63f6e26f1b761667996df8232e9c7d202fb3d078c50cd1ec0efd6be31ce52c8328c39332ab8e275cb0043255025c7c20c96d18aaf2f3817b4dbfb29ff875dc0efdcf97e337d25f9c1663b6d803dd671b4e4d066187d8369da7fdf5ed92b943f6d2918012ac53829a6d1c0035a87f2989e99a7c8030a25a47583255eed734dd5f919f06e24eb8985ce067195cce8b7941cc99cbb774649bc2203b4d155b2f4882e7c9a1bb835bed9eb9edff86525b648cf5a8c3f69b0a861fee2b4e8804cfd385f936f7cd6e4a9e5bb576344acfb8e9de5a8d9b0204248c40bef338c24902bd77515506b79a37014070cae747f1354180e9514656c71987a3c38581bfa7243b51089338c03e174a04ec9b88ff8341c414dcf702b661005145651d9089d1243e53f8c42d2352fadd4cb671e39eb20c8f221b599fdad75d11b061921b4167638936c7533ffd66d01217f9dc9662302eb39a142d67af07943d56d36f4f391937ae01b58df231b533b4084736d69e6b26177d97ad18698f0f32072fe58d5cd6d7ebb6f74f7edce7082d80d1835b48287065b6c919de1c84090e2139f01126db026574914d46cb8d397be6396bd5b48b60ac7f0fd8", 0x1000}, {&(0x7f0000004dc0)="b9db0b5b15862c5a83d7dca51875ed6d8af9a667a5693a0391146d3e09cb361641ff", 0x22}, {&(0x7f0000004e00)="eea58c0573a4999d580846f8d53fbd2b7fdf0693248a17ddb7f8bda540839e8185602066b9826af9da9ece99fc7bc9c143a0ee1c87d286c8a249bb1de0066c761b827a68e96d356b9c24d6cf737246bd9e8c7c822c5eb87f0fdb983c5af344cd24c386e679d7b9204d0a36b7b01f0a041656e25b1d820d376053681aa512aa1194c7c3dd4c1690f79d82261efbd7c4cb927ed69657deb58506b73d861fc305b219f38497a93f402ae0c4f8b66be20b", 0xaf}], 0x3, &(0x7f0000004f00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast1, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffa}}, @ip_retopts={{0x98, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x4c, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0x23}, 0x55}, {@multicast1, 0x7fffffff}]}, @timestamp={0x44, 0x14, 0x56, 0x0, 0x8, [0x1, 0x0, 0x8, 0x10001]}, @noop, @cipso={0x86, 0x59, 0xffffffffffffffff, [{0x6, 0xa, "5fd9f015ee277e39"}, {0x5, 0x2}, {0x0, 0x12, "8d43e7aa3bd682cc5a35cca5a6ae03b8"}, {0x6, 0x8, "5514fd26dce5"}, {0x5, 0xc, "1ea5fa868336701297e3"}, {0x5, 0x2}, {0x5, 0x9, "39dc39aa4c1b5e"}, {0x2, 0x4, "06f3"}, {0x2, 0x12, "b7c1e2b209c82dfdd8bdd4d1188418a1"}]}, @noop, @noop, @ra={0x94, 0x4}]}}}], 0xd0}}], 0x5, 0x4081) 15:54:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x21, "a6c5cdd386643735d7e432c7f1b8d85afc7e0486f990c3d410bf8823b1bac0ee5b"}, &(0x7f0000000080)=0x29) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[], 0x208e24b) r4 = socket$vsock_stream(0x28, 0x1, 0x0) read(r4, &(0x7f00000011c0)=""/124, 0x7c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) connect$bt_sco(r3, &(0x7f0000001180)={0x1f, @fixed={[], 0x12}}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x100}, &(0x7f0000000100)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="b70200000000006f96789c00000000000703000000feffff7a8af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000009000000b7000000000000009500000000007753843dfe5dba992b812d58d3f400004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 15:54:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x11}, 0x0) 15:54:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x5865}, 0x0) [ 1401.914993][T14422] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1401.936471][ T29] audit: type=1804 audit(1591890843.979:680): pid=14407 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/957/memory.events" dev="sda1" ino=16100 res=1 [ 1401.974072][T14422] device ipvlan788 entered promiscuous mode 15:54:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f00000000c0), 0x0) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@empty, @initdev}, &(0x7f00000000c0)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000c884) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x11) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, 0x9, 0x2, 0x1, 0x5, 0x2, 0x80}, 0x20) 15:54:06 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000005865000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12}, 0x0) 15:54:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000}, 0x0) [ 1404.111965][T14422] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000040)={'macvtap0\x00', @ifru_hwaddr=@dev={[], 0x20}}) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000010c0)=0x4000) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x1, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x8, 0x2, 0x8, 0x6, 0x7f, 0x3, 0x0, 0xb8, 0x96, 0x9, 0x81, 0x33, 0x0, 0x2b}, 0xe) [ 1404.646403][T14443] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259c0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x13}, 0x0) 15:54:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6558}, 0x0) 15:54:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000081000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1405.071476][T14486] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1405.083608][T14486] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1405.124598][T14489] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1405.136687][T14489] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1405.161624][T14488] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1405.204422][T14488] device ipvlan789 entered promiscuous mode 15:54:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x60}, 0x0) [ 1405.470408][T14488] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8100}, 0x0) 15:54:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000ffffa888000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1405.563912][T14488] device ipvlan790 entered promiscuous mode [ 1405.654196][T14489] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc040000}, 0x24000040) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000002200000028001200090001007665746880077d2d55c4447b37a9c62d50fd5e8811d6e72a5a1c3e1d818fa032fb968b51664064d041e95df6670edc10a95078325ddacca8e7cd686060ac3337f59bc6"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_DIVISOR={0x8}]}}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000001340)={0x10f4, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0x1004, 0x24, "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"}, @NL80211_ATTR_MESH_ID={0xc5, 0x18, "1b24d41ef54fba3a1fa8459044897ba13637d125077774725c1eab5b5ad8ea26ce41c8d53a8aa042f97df782bd2afc467a97372e1b2c6060c20a8125e727024b5c83ebcda20067ca97138c8a32d33aa408ec43e67f1f57f2588f9dddb9553dadb1f6019487343c9a5d3b8d48966cc4f8641e5bf1cb7b746cffb20302e029ba8f7407243ba3aeaf8ce096045be6f5c7e08f901732008ba847dcfc8d2cb56dbd0c6c622f85247c9ff8d72b1609591707d17fffe54d73f98c821215026ce543543dde"}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x10f4}, 0x1, 0x0, 0x0, 0x20000814}, 0x4000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) 15:54:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0}, 0x0) [ 1405.703512][T14489] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259d0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xd102}, 0x0) 15:54:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'vlan0\x00', {}, 0x4000}) 15:54:09 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000058b000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1407.196065][T14532] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1407.205399][T14532] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x204}, 0x0) 15:54:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf000}, 0x0) [ 1408.735307][T14535] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1408.754647][T14535] device ipvlan791 entered promiscuous mode [ 1408.776276][T14539] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f00000000c0), 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}, 0x14a, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)='team_slave_1\x00', 0x80, 0x8, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x64}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x6, 0x1}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 1408.821477][T14549] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1408.838757][T14552] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1408.866047][T14552] device ipvlan792 entered promiscuous mode 15:54:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259e0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000ffffff9e000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x34000}, 0x0) [ 1409.576613][T14581] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1409.612232][T14581] device ipvlan793 entered promiscuous mode 15:54:11 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0xc031, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x58, 0x0, 0x8, 0x0, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x888e}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x58}}, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f3, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=ANY=[]}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags}) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x14) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x4, 0x8, 0x96, 0x4, r4}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000003c0)=ANY=[@ANYRES32=r5, @ANYBLOB="dc000000f917b05bf0caf1c868227d5a796824b3e0182a65830c61723fe6dac3b2c1aea5eca633cb6a50a36126c6591025a6221c53eaa99e93891455694d0eff727abaa69e756d17e736f4fa24bdf283c1e8ac7ca3d7219c34765d1d305498078d991a8d5443ef18d5bfe2882c96eaae6173b44eb8d4a972d5fca49a1e22470a23d8a8503f6e1997dd8df9248a3934dd44390d125684a9252c29b22aa0421f73596d9fc15292805547ed205d4caa3548aa31d99eb8d9176b2c2ccd87fb2476194d68df1122b38a72638b939412075c4443474d94bfcf5aad6303c251423efe7cbc7197128f3f55e9e72311145c8780"], &(0x7f0000000380)=0xe4) 15:54:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2b6}, 0x0) [ 1409.724892][T14581] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1409.756130][T14596] IPVS: ftp: loaded support on port[0] = 21 15:54:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000200)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x27, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ipvlan0\x00'}, @SMC_PNETID_NAME={0x0, 0x1, 'syz0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x20040814) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESOCT=r1], 0x20}}, 0x4000000) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x200000c5) [ 1409.883097][T14581] device ipvlan794 entered promiscuous mode 15:54:12 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100003500) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) pipe(0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x70, 0x0, 0x8e6767b8eef245b5, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xc}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffd}]}, 0x70}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002bbd7000000000000a000000040003801800028014000100ff02000000000000000000000000000104000180080005000efeffff1c0003800800030003000000060007001e554e230000060004000010"], 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'macvlan1\x00'}) writev(r4, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0x1000}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 15:54:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x400300}, 0x0) 15:54:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x300}, 0x0) [ 1410.247063][ T29] audit: type=1804 audit(1591890852.499:681): pid=14611 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/922/memory.events" dev="sda1" ino=16133 res=1 [ 1410.296188][ T29] audit: type=1800 audit(1591890852.499:682): pid=14611 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16133 res=0 [ 1410.381266][ T29] audit: type=1804 audit(1591890852.539:683): pid=14615 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/922/memory.events" dev="sda1" ino=16133 res=1 [ 1410.842655][ T29] audit: type=1804 audit(1591890853.089:684): pid=14619 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/922/memory.events" dev="sda1" ino=16133 res=1 [ 1410.875174][T14630] IPVS: ftp: loaded support on port[0] = 21 [ 1410.964424][ T29] audit: type=1804 audit(1591890853.179:685): pid=14611 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/922/memory.events" dev="sda1" ino=16133 res=1 15:54:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x3f9, 0x200, 0x70bd2a, 0x25dfdbff, {0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x11}, 0x240400c1) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff060000000a0000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) [ 1411.000597][ T29] audit: type=1800 audit(1591890853.179:686): pid=14611 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16133 res=0 15:54:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e020200259f0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1411.215964][T14643] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 15:54:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x402}, 0x0) 15:54:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffff}, 0x0) 15:54:15 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000fffffff0000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x12) sendmsg$nl_route_sched(r0, &(0x7f0000001740)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001700)={&(0x7f0000001440)=@deltaction={0x2bc, 0x31, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x74, 0x1, [{0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x87}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffa}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x94, 0x1, [{0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x14, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000000}}]}, @TCA_ACT_TAB={0x68, 0x1, [{0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x58, 0x1, [{0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffffff7f}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7f}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6f8aa045}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xd35b}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6a}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x4c, 0x1, [{0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x1e, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffa02}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xd781}}]}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x814}, 0x10) socket(0x0, 0x0, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="010000000000003dc49e8418ff", @ANYRES32=0x0, @ANYBLOB="69110100000000001800128008000100736974000c00028008000300e0000001"], 0x38}}, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) [ 1413.152800][T14651] __nla_validate_parse: 5 callbacks suppressed [ 1413.152811][T14651] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1413.188174][T14651] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1413.198677][T14668] IPVS: ftp: loaded support on port[0] = 21 [ 1413.215790][T14654] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1413.305157][T14654] device ipvlan795 entered promiscuous mode [ 1413.345777][T14661] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1413.355101][T14661] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1413.435944][T14664] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1413.495275][T14664] device ipvlan796 entered promiscuous mode [ 1414.010656][T14670] IPVS: ftp: loaded support on port[0] = 21 15:54:24 executing program 0: socket(0x40000000015, 0x805, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket(0x10, 0x80002, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)={0x194, r7, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x18000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4759}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x8000}, 0x4015) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c002000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32=r6], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 15:54:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x500}, 0x0) 15:54:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1000000}, 0x0) 15:54:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a00535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:24 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000fffe000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x600}, 0x0) [ 1421.799758][T14696] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1421.825422][T14696] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:24 executing program 4: unshare(0x40100) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000002c0)=ANY=[]}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000040)) recvfrom$rxrpc(r2, &(0x7f00000001c0)=""/253, 0xfd, 0x40012101, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x2, @remote, 0xffffff88}}, 0x24) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @ipv4={[], [], @private=0xa010100}, 0x1}, {0xa, 0x4e21, 0x1, @mcast1, 0x5}, 0x0, [0x6, 0x9, 0x1, 0xc9, 0x400, 0x800, 0x4, 0xffff]}, 0x5c) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags}) 15:54:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2000000}, 0x0) 15:54:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r4, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r4, 0x200, 0x70bf27, 0x25dfdbfd}, 0x14}}, 0x20008000) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000380)={r7, 0x9c, &(0x7f0000000440)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e21, 0x200000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}, @in6={0xa, 0x4e21, 0x2, @ipv4={[], [], @multicast1}, 0xb68d}, @in6={0xa, 0x4e20, 0x2, @mcast1, 0x7fffffff}, @in6={0xa, 0x4e22, 0x40000000, @private1}, @in6={0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, [], 0x1}, 0x101}]}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000540)=@assoc_value={r8, 0x425}, 0x8) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0xfffffffffffffcf1, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000db881e3fb4599c9b7cbbeeeacbe34a"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_GSO_MAX_SIZE={0x8}, @IFLA_PROTO_DOWN={0x5}]}, 0x30}}, 0x0) 15:54:25 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000fff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1422.755863][T14696] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1422.796103][T14696] device ipvlan797 entered promiscuous mode [ 1422.835289][T14718] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x612}, 0x0) 15:54:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2040000}, 0x0) [ 1422.952143][T14719] A link change request failed with some changes committed already. Interface veth51 may have been left with an inconsistent configuration, please check. [ 1423.008883][T14724] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1423.040519][T14724] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1423.087358][T14726] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03affff) sendfile(r1, r0, 0x0, 0x800000000000c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x111) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) close(r2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x4, 0xfffffffd, 0x0, 0xf2, 0xb}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f0000000100)=0x9, 0x4) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) [ 1423.227055][T14726] device ipvlan798 entered promiscuous mode 15:54:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a10535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:26 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000088a8ffff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1424.017901][T14757] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x900}, 0x0) 15:54:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3000000}, 0x0) [ 1424.100209][T14757] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1424.229082][ T29] audit: type=1800 audit(1591890866.480:687): pid=14755 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=15955 res=0 [ 1424.312694][T14761] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1424.357115][T14761] device ipvlan799 entered promiscuous mode [ 1424.953105][T14767] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa00}, 0x0) [ 1424.995507][T14767] device ipvlan800 entered promiscuous mode 15:54:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xf, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x84}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "49d3d11aeee71782", "7fd85d0a0493dc27ed7f6730613d3c1a", "5a950980", "6b43b250b6c46147"}, 0x28) 15:54:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x4000000}, 0x0) 15:54:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a20535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:27 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000f0ffff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1425.502765][T14805] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x5000000}, 0x0) [ 1425.591619][T14805] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1425.615863][T14808] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1425.637595][T14808] device ipvlan801 entered promiscuous mode 15:54:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb00}, 0x0) [ 1425.711929][T14808] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1425.753977][T14808] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1425.825357][T14808] device ipvlan802 entered promiscuous mode 15:54:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03affff) sendfile(r1, r0, 0x0, 0x800000000000c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x111) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) close(r2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x4, 0xfffffffd, 0x0, 0xf2, 0xb}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f0000000100)=0x9, 0x4) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) 15:54:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000000}, 0x0) 15:54:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc00}, 0x0) 15:54:29 executing program 4: unshare(0x4c020580) r0 = socket$netlink(0x10, 0x3, 0x4000000000000009) setsockopt(r0, 0x10e, 0xb, &(0x7f0000f67000)="9adc01ce", 0x4) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="18000c00", @ANYRES16=r1, @ANYBLOB="020022bd7000fbdbdf250400000040eff64858f025c8b06251638bbe679e0b5c46f8246484c910bed8085cbe9b9b8c8cc4d020cd5ac29541e49d2b5894aa8e1b8185f3f5b3774c7971677f961518c076"], 0x18}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000001f00000127bd7000fddbdf250e000000da815989409c91d8fd07bad0c4efb6eb852efd90de7454e347f594a07f5f7ee38e116f01000000ee297dff03510000000000"], 0x54}, 0x1, 0x0, 0x0, 0x11}, 0x4) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8904) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000400)={@empty, r3}, 0x14) sendto$inet6(r2, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write(r2, &(0x7f0000001740)="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", 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ab8000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 15:54:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a30535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:29 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400007fffffff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe00}, 0x0) 15:54:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8000000}, 0x0) 15:54:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2b010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c0000002400290800000000000000000400000008000c00", @ANYRES32=0x0, @ANYBLOB="96f3a2e336a52f76e0f6bdad2a771505aa"], 0x1c}, 0x1, 0xffffff7f0e000000}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000000000) [ 1428.984949][T14848] __nla_validate_parse: 1 callbacks suppressed [ 1428.984960][T14848] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:31 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400009effffff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1429.053559][T14848] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1429.067994][ T29] audit: type=1804 audit(1591890871.320:688): pid=14874 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/928/cgroup.controllers" dev="sda1" ino=16153 res=1 [ 1429.151217][T14854] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1429.225117][ T29] audit: type=1804 audit(1591890871.420:689): pid=14875 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/928/cgroup.controllers" dev="sda1" ino=16153 res=1 [ 1429.274175][T14854] device ipvlan803 entered promiscuous mode 15:54:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280), 0x10) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x10000ab00) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000800}, 0x8000) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x2]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 1429.356068][T14867] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9000000}, 0x0) [ 1429.444778][ T29] audit: type=1804 audit(1591890871.510:690): pid=14874 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/928/cgroup.controllers" dev="sda1" ino=16153 res=1 [ 1429.473468][T14867] device ipvlan804 entered promiscuous mode [ 1429.574333][T14893] IPVS: ftp: loaded support on port[0] = 21 [ 1430.195998][T14893] virt_wifi0 speed is unknown, defaulting to 1000 [ 1430.296902][T14890] IPVS: ftp: loaded support on port[0] = 21 [ 1430.651898][T14890] virt_wifi0 speed is unknown, defaulting to 1000 15:54:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03affff) sendfile(r1, r0, 0x0, 0x800000000000c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x111) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) close(r2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x4, 0xfffffffd, 0x0, 0xf2, 0xb}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f0000000100)=0x9, 0x4) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) 15:54:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf00}, 0x0) 15:54:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a40535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:34 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000f0ffffff000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa000000}, 0x0) 15:54:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) bind$unix(r4, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e) [ 1432.019298][ T29] audit: type=1804 audit(1591890874.250:691): pid=14955 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/930/cgroup.controllers" dev="sda1" ino=16175 res=1 [ 1432.082414][T14955] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1432.110943][T14955] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/930/cgroup.controllers PID: 14955 Comm: syz-executor.4 [ 1432.160360][T14955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1432.284697][ T43] tipc: TX() has been purged, node left! 15:54:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1100}, 0x0) [ 1432.532899][T14954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1432.555279][T14954] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:34 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000340000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1432.690397][T14959] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb000000}, 0x0) [ 1432.734068][T14959] device ipvlan805 entered promiscuous mode [ 1432.834898][T14965] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1432.878175][T14965] device ipvlan806 entered promiscuous mode [ 1432.938908][ T29] audit: type=1804 audit(1591890875.191:692): pid=14964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/930/cgroup.controllers" dev="sda1" ino=16175 res=1 15:54:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) bind$unix(r4, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e) [ 1432.986429][ T29] audit: type=1800 audit(1591890875.191:693): pid=14964 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16175 res=0 [ 1433.091419][ T29] audit: type=1804 audit(1591890875.191:694): pid=14967 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/930/cgroup.controllers" dev="sda1" ino=16175 res=1 [ 1433.206990][ T29] audit: type=1800 audit(1591890875.191:695): pid=14967 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16175 res=0 [ 1433.320905][ T29] audit: type=1804 audit(1591890875.551:696): pid=14992 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/931/cgroup.controllers" dev="sda1" ino=16175 res=1 [ 1433.422632][T14992] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1433.458527][T14992] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/931/cgroup.controllers PID: 14992 Comm: syz-executor.4 [ 1433.592763][T14992] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:36 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000fffffffffffff0000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a50535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1434.148412][T15004] device vlan3 entered promiscuous mode [ 1434.253960][T15005] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1434.264215][T15005] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1434.274135][T15011] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1434.294543][T15011] device ipvlan807 entered promiscuous mode [ 1434.388574][T15011] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1434.437724][T15011] device ipvlan808 entered promiscuous mode 15:54:38 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x5) sendmsg$NFNL_MSG_CTHELPER_NEW(r3, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x88, 0x0, 0x9, 0x401, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x50, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x30}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xd}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x4}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008041) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="8c0000006400270d00"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000000000000b000100666c6f77657200005c000200080038ff00000000080016000d000000060024000000000006000800001b000006005e0009000000270002"], 0x8c}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) 15:54:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) bind$unix(r4, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 15:54:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc000000}, 0x0) 15:54:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1200}, 0x0) 15:54:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a60535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1436.636008][T15032] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe000000}, 0x0) [ 1436.698665][T15032] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1436.752586][ T29] audit: type=1804 audit(1591890879.001:697): pid=15041 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/932/cgroup.controllers" dev="sda1" ino=16198 res=1 [ 1436.783982][T15038] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1206}, 0x0) [ 1436.851907][T15038] device ipvlan809 entered promiscuous mode [ 1436.903908][T15039] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf000000}, 0x0) [ 1436.969398][T15039] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1437.004375][T15038] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000000)) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) [ 1437.039876][T15038] device ipvlan810 entered promiscuous mode [ 1437.107573][T15035] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a70535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1437.270008][T15070] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1437.331240][T15071] sctp: [Deprecated]: syz-executor.0 (pid 15071) Use of int in maxseg socket option. [ 1437.331240][T15071] Use struct sctp_assoc_value instead [ 1437.349210][T15070] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1437.421680][T15072] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1437.459533][T15072] device ipvlan811 entered promiscuous mode [ 1437.528798][T15070] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1437.549841][T15072] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1437.675260][T15072] device ipvlan812 entered promiscuous mode 15:54:41 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000010000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1300}, 0x0) 15:54:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x10000000}, 0x0) 15:54:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e35, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c80)={r3}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r7, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f00000030c0)={&(0x7f0000000cc0), 0xc, &(0x7f0000003080)={&(0x7f0000002f00)={0x154, r7, 0xb01, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff7fff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffc8f7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}]}, @TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000d00)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {}, [@TCA_CHAIN={0x8, 0xb, 0xfffff48a}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 15:54:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) bind$unix(r4, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 15:54:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a80535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3f00}, 0x0) 15:54:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x11000000}, 0x0) [ 1439.318763][ T29] audit: type=1804 audit(1591890881.571:698): pid=15094 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/933/cgroup.controllers" dev="sda1" ino=16224 res=1 [ 1439.499294][T15094] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1439.537148][T15094] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/933/cgroup.controllers PID: 15094 Comm: syz-executor.4 [ 1439.592868][T15094] __nla_validate_parse: 1 callbacks suppressed [ 1439.592880][T15094] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) [ 1440.208154][ T29] audit: type=1804 audit(1591890882.451:699): pid=15123 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/934/cgroup.controllers" dev="sda1" ino=16224 res=1 [ 1440.255950][T15122] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1440.292368][T15122] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/934/cgroup.controllers PID: 15122 Comm: syz-executor.4 [ 1440.353753][T15122] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:42 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000020000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1440.435355][T15092] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1440.450139][T15092] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1440.460973][T15095] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1440.500532][T15095] device ipvlan813 entered promiscuous mode 15:54:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x5865}, 0x0) [ 1440.596172][T15101] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) [ 1441.190705][ T29] audit: type=1804 audit(1591890883.441:700): pid=15142 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/935/cgroup.controllers" dev="sda1" ino=16224 res=1 [ 1441.287215][T15142] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1441.313221][T15142] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/935/cgroup.controllers PID: 15142 Comm: syz-executor.4 [ 1441.437461][T15142] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) [ 1442.452667][ T29] audit: type=1804 audit(1591890884.681:701): pid=15153 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/936/cgroup.controllers" dev="sda1" ino=16224 res=1 [ 1442.553147][T15150] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1442.565662][T15150] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/936/cgroup.controllers PID: 15150 Comm: syz-executor.4 [ 1442.582224][T15150] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) [ 1443.294339][ T29] audit: type=1804 audit(1591890885.541:702): pid=15155 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/937/cgroup.controllers" dev="sda1" ino=16224 res=1 [ 1443.436912][T15155] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1443.457181][T15155] File: /root/syzkaller-testdir823963808/syzkaller.qgWByR/937/cgroup.controllers PID: 15155 Comm: syz-executor.4 15:54:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12000000}, 0x0) [ 1443.593331][T15155] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1443.777692][T15113] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1443.827546][T15113] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1444.175767][T15118] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1444.213009][T15118] device ipvlan814 entered promiscuous mode 15:54:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025a90535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:54:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000}, 0x0) 15:54:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12060000}, 0x0) 15:54:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e35, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000c80)={r3}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r7, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f00000030c0)={&(0x7f0000000cc0), 0xc, &(0x7f0000003080)={&(0x7f0000002f00)={0x154, r7, 0xb01, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff7fff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffc8f7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}]}, @TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000d00)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {}, [@TCA_CHAIN={0x8, 0xb, 0xfffff48a}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 15:54:47 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000030000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1445.198010][ T29] audit: type=1804 audit(1591890887.451:703): pid=15184 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/938/cgroup.controllers" dev="sda1" ino=16238 res=1 [ 1445.413083][T15184] __nla_validate_parse: 1 callbacks suppressed [ 1445.413099][T15184] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1445.584343][T15179] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1445.600973][T15179] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1445.635290][T15188] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1445.667551][T15188] device ipvlan815 entered promiscuous mode 15:54:47 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000040000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1445.683998][T15195] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6558}, 0x0) 15:54:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x13000000}, 0x0) 15:54:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100002a00) [ 1446.364499][ T29] audit: type=1804 audit(1591890888.621:704): pid=15218 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/939/cgroup.controllers" dev="sda1" ino=16238 res=1 15:54:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100002a00) [ 1446.545062][T15179] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1446.593900][T15179] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100002a00) [ 1446.645227][ T29] audit: type=1804 audit(1591890888.901:705): pid=15220 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/940/cgroup.controllers" dev="sda1" ino=16238 res=1 [ 1446.854995][T15191] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1446.918310][T15191] device ipvlan816 entered promiscuous mode [ 1446.929754][ T29] audit: type=1804 audit(1591890889.181:706): pid=15229 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/941/cgroup.controllers" dev="sda1" ino=16241 res=1 15:54:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025aa0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:49 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000050000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100002a00) 15:54:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x4) write$binfmt_script(r4, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) 15:54:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8100}, 0x0) 15:54:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x60000000}, 0x0) 15:54:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100002a00) [ 1447.407141][ T29] audit: type=1804 audit(1591890889.661:707): pid=15242 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/971/cgroup.controllers" dev="sda1" ino=16239 res=1 [ 1447.680631][T15242] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100002a00) [ 1447.896435][T15243] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1447.938163][T15243] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x65580000}, 0x0) 15:54:50 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1448.046178][T15247] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1448.103613][T15247] device ipvlan817 entered promiscuous mode [ 1448.134025][T15265] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb602}, 0x0) 15:54:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1448.238045][T15265] device ipvlan818 entered promiscuous mode [ 1448.417940][ T29] audit: type=1804 audit(1591890890.671:708): pid=15279 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/945/cgroup.controllers" dev="sda1" ino=16245 res=1 15:54:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ab0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x7c, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x68, 0x1, [@m_tunnel_key={0x64, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000040)) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwritev(r1, &(0x7f0000000500)=[{&(0x7f0000001340)='+', 0x1}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x400c084) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = accept$netrom(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) 15:54:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x81000000}, 0x0) 15:54:51 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000070000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf000}, 0x0) 15:54:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x88a8ffff}, 0x0) 15:54:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x34000}, 0x0) 15:54:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1449.604987][ T29] audit: type=1804 audit(1591890891.861:709): pid=15299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/972/cgroup.controllers" dev="sda1" ino=16220 res=1 15:54:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x400300}, 0x0) [ 1449.683427][ T29] audit: type=1804 audit(1591890891.931:710): pid=15313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/946/cgroup.controllers" dev="sda1" ino=15826 res=1 15:54:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1450.614759][ T29] audit: type=1804 audit(1591890892.871:711): pid=15328 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/947/cgroup.controllers" dev="sda1" ino=15826 res=1 15:54:53 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000080000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000100)="2400000052001f000307f4f9002304000a04f51104000100020100020800038005000000", 0x24) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000018c0)={{0x2, 0x4e24, @broadcast}, {0x306, @remote}, 0x10, {0x2, 0x4e22, @multicast1}, 'geneve0\x00'}) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'bridge_slave_1\x00', @ifru_mtu=0x9}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendto$inet6(r0, &(0x7f0000000380)="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", 0x1035, 0x81, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000340)=0x10) [ 1450.695865][T15300] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1450.724588][T15300] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1450.782438][T15301] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1450.823949][T15301] device ipvlan819 entered promiscuous mode [ 1450.964224][T15322] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1450.978434][T15322] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1451.004877][T15323] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1451.093724][T15323] device ipvlan820 entered promiscuous mode 15:54:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ac0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9effffff}, 0x0) 15:54:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffff}, 0x0) 15:54:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1452.273216][ T29] audit: type=1804 audit(1591890894.521:712): pid=15358 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/948/cgroup.controllers" dev="sda1" ino=15826 res=1 15:54:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000090000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:54:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b40000bd840000007301ff000000000000008d00000000000000d50000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000740)) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000040)=0x1, 0x4) 15:54:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1000000}, 0x0) [ 1452.403772][T15349] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1452.413096][T15349] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1452.542127][T15351] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xd1020000}, 0x0) 15:54:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2000000}, 0x0) [ 1452.682762][T15351] device ipvlan821 entered promiscuous mode [ 1452.724891][T15366] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1452.750884][T15366] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1452.783273][T15367] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:55 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x6, 0x80f7883c384da80b, 0x0, &(0x7f00000000c0)) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="246d00002c00270d000000000000000400000000", @ANYRES32=r3, @ANYBLOB="00000000000000000e00000008000b00060000000b000100666c6f77657200004800020008005f000600000005004c001f00000008001a00fffeffff06004f008100000005003e00200000000500500006000000140061"], 0x6d24}}, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 1452.872683][T15367] device ipvlan822 entered promiscuous mode 15:54:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ad0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1453.773816][ T29] audit: type=1800 audit(1591890896.022:713): pid=15394 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=15826 res=0 15:54:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x2040000}, 0x0) [ 1454.664868][T15393] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:57 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000000a0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffff}, 0x0) [ 1454.728517][T15398] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1454.760771][T15401] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1454.809601][T15401] device ipvlan823 entered promiscuous mode [ 1454.829425][T15416] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1454.875299][T15416] device ipvlan824 entered promiscuous mode 15:54:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffa888}, 0x0) 15:54:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) [ 1454.946200][ T29] audit: type=1804 audit(1591890897.202:714): pid=15422 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/950/cgroup.controllers" dev="sda1" ino=15826 res=1 15:54:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3000000}, 0x0) 15:54:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ae0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:54:57 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="540000003000ffff0000000000000000000000004000567d4326048403f201006e6174"], 0x54}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f0000000100)=0x4) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="250000e5ff0700000000000010"], 0x18}}], 0x1, 0x0) close(r1) bind$x25(r1, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 15:54:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:54:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) r1 = accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:54:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1455.919496][ T29] audit: type=1804 audit(1591890898.172:715): pid=15466 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/954/cgroup.controllers" dev="sda1" ino=15826 res=1 [ 1456.083199][T15466] __nla_validate_parse: 6 callbacks suppressed [ 1456.083211][T15466] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1456.535891][ T29] audit: type=1804 audit(1591890898.792:716): pid=15476 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/955/cgroup.controllers" dev="sda1" ino=15826 res=1 [ 1456.721280][T15476] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:54:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffff000}, 0x0) [ 1456.947712][T15446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1456.980500][T15446] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:54:59 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000000b0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:54:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x4000000}, 0x0) 15:54:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1457.098473][T15450] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1457.135371][T15450] device ipvlan825 entered promiscuous mode [ 1457.192647][T15472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1457.204219][T15472] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1457.215491][T15473] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:54:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:54:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1457.252203][T15473] device ipvlan826 entered promiscuous mode 15:54:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025af0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1457.563546][ T29] audit: type=1804 audit(1591890899.812:717): pid=15499 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/957/cgroup.controllers" dev="sda1" ino=16168 res=1 [ 1457.611081][ T29] audit: type=1804 audit(1591890899.852:718): pid=15496 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/977/cgroup.controllers" dev="sda1" ino=15826 res=1 [ 1457.769369][T15499] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1457.779119][T15496] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:00 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000000c0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1458.343490][T15501] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1458.352821][T15501] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff7f}, 0x0) 15:55:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x5000000}, 0x0) [ 1458.417702][T15505] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:00 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100002a00) [ 1458.529379][T15505] device ipvlan827 entered promiscuous mode [ 1458.613546][T15520] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1458.644506][ T29] audit: type=1804 audit(1591890900.902:719): pid=15519 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/978/cgroup.controllers" dev="sda1" ino=15826 res=1 [ 1458.662606][T15520] device ipvlan828 entered promiscuous mode 15:55:00 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100002a00) 15:55:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff9e}, 0x0) 15:55:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000000}, 0x0) 15:55:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b00535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:01 executing program 4: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100002a00) 15:55:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(0x0) accept4(r0, &(0x7f0000000280)=@x25, &(0x7f0000000180)=0x80, 0x800) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1459.711751][ T29] audit: type=1804 audit(1591890901.962:720): pid=15562 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/979/cgroup.controllers" dev="sda1" ino=15826 res=1 15:55:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000000e0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8000000}, 0x0) [ 1459.884134][T15549] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffffff0}, 0x0) [ 1459.976533][T15549] device ipvlan829 entered promiscuous mode 15:55:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1460.653215][T15569] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1460.784444][T15569] device ipvlan830 entered promiscuous mode 15:55:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b10535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_j1939(r0, &(0x7f0000000340)={&(0x7f0000000040)=@isdn, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f0000000100)=""/227, 0xe3}], 0x2, &(0x7f0000000240)=""/246, 0xf6}, 0xa0) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000400)={0x4, &(0x7f0000000380)=[{0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @local}, {}]}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000440)={{0x2, 0x4e20, @loopback}, {0x306}, 0x2c, {0x2, 0x4e22, @remote}, 'gretap0\x00'}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000580)=@alg, &(0x7f0000000600)=0x80, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000640)={0x7b, "bcf1f6ff7bb0275bc629a1791880a68a7a02a415674c3cce0e6ba65dae8f9f594dd6e103fb0feaccfd45cfac4ffac4e6de8a74b3e2f2d90fd00b16989beec80d51918b7f889ed63a8c65384a771947f2dbd57d8f5865250ee358b2fa29e7112d123af3ee7d7936b85d9b9b89dc9cc5609145cb669fdf8d1ec0c293e5b6f594dc"}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000700)=0x9, &(0x7f0000000740)=0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f00000007c0)) r5 = accept4(0xffffffffffffffff, &(0x7f0000000800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000880)=0x80, 0x800) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x2c, r6, 0x800, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffb97}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x80) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x28, r7, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_SEQ={0x14, 0xa, "41ce9d74fa9a14b5537a9a3509f04076"}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) r8 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r8, 0x5411, &(0x7f0000001ec0)) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000002280)={&(0x7f0000001f00)="2aeb0277bc10aa91aa80d17b3b168709980fb365e906ee8a308e0df4f7c6a1311c571455db71a918e1c14a61ef44b92264fcba19fd13ac610f1c0d3d8b964be6a569a5392611622a377c8f10b19b91c215ce2d91e1b26877510f774471f218dc4024db1dc526bb51042700009b2f6fed658bf8604e8770cbf88de68efb51808bd123e8cd8541cb5e7b550d0885c7d0b056842a3444fa74cc547473ade09511fb86b4372b294428b814ba171ea77989e23efc99915a66f1998f657bd5605eaa6a59f697eb0532e0a80d81cefea524522deaae2b701783b244e28ee76af83dd1c5403cfa2abda021904a", &(0x7f0000002000)=""/105, &(0x7f0000002080)="14f9bd0877a6d4be2e9e637181c769df81b9a81a11afffa9fab0dff4464f43e6c71312fd308af703980f23b789d9d6b111e535d514f72ed254290f1b2bb4b95a86e811ebf07290bb9b52baa1e5d1edcf96be6abc13c06222eaa1724696c7cd24bec2b4d982b8ba3485fcfa3b00386d20eba64f585bb0cd6ea9627247fa42847396a12b164bc105dac3cd82e6c35cc7ff520151b26d0e1cb7459b22d9c949eeb951b2a31c065f5600590e96f2215f4ced3717f00f0673df9a38d60db2db019e3dae86100e42a780ec960fb664148516f1b4c8", &(0x7f0000002180)="fa3aec0031d7b2e7817a5280c86d908662b8fc8aaae47b66079fe57cfcc94a71b788a9514fcc64c41e2a3b4dc61f31d7b50e4cbbc4efeb5adbb8962156c75b7d7240e8738218fda78ab8a9557219334a4d42a6de8be075aef21e7e045329dcaa02cbde8296ac1eae8bf1c7f2472914ebc0d396948f848033e730172ac752652e2321a6803699f4a4", 0x81, 0xffffffffffffffff, 0x4}, 0x38) 15:55:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9000000}, 0x0) 15:55:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:04 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000000f0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, 'C.\x00', 0x14, 0x67, 0x0, @dev, @dev={0xfe, 0x80, [], 0x23}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x8}}}}}}}, 0x0) 15:55:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x40030000000000}, 0x0) 15:55:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa000000}, 0x0) [ 1462.488994][T15605] __nla_validate_parse: 8 callbacks suppressed [ 1462.489006][T15605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1462.509735][T15605] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1462.543802][T15609] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1462.641745][T15609] device ipvlan831 entered promiscuous mode 15:55:04 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000100), 0x4) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000180)={'tunl0\x00', @ifru_hwaddr=@link_local}) socket$inet_mptcp(0x2, 0x1, 0x106) 15:55:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1462.692822][T15621] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1462.799969][T15621] device ipvlan832 entered promiscuous mode [ 1462.841467][T15639] IPVS: ftp: loaded support on port[0] = 21 15:55:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b20535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb000000}, 0x0) 15:55:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffffffffff}, 0x0) 15:55:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1463.780362][T15667] IPVS: ftp: loaded support on port[0] = 21 15:55:06 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000100000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1464.063049][T15639] virt_wifi0 speed is unknown, defaulting to 1000 [ 1464.073541][T15653] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1464.082859][T15653] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc000000}, 0x0) 15:55:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x100000000000000}, 0x0) [ 1464.169075][T15655] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1464.240142][T15655] device ipvlan833 entered promiscuous mode [ 1464.406542][T15662] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1464.482933][T15662] device ipvlan834 entered promiscuous mode 15:55:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b30535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1464.958015][ T29] audit: type=1804 audit(1591890907.212:721): pid=15687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/973/cgroup.controllers" dev="sda1" ino=16167 res=1 [ 1466.384388][T15698] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1466.414810][T15698] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1466.468633][T15702] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1466.503415][T15702] device ipvlan835 entered promiscuous mode [ 1466.526442][T15667] virt_wifi0 speed is unknown, defaulting to 1000 [ 1466.534065][T15712] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1466.557888][T15712] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1466.590094][T15713] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1466.637998][T15713] device ipvlan836 entered promiscuous mode [ 1472.359114][ T43] tipc: TX() has been purged, node left! [ 1473.233637][ T43] tipc: TX() has been purged, node left! 15:55:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x200000000000000}, 0x0) 15:55:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe000000}, 0x0) 15:55:17 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000110000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b40535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:17 executing program 0: unshare(0x40000000) mmap(&(0x7f00008aa000/0x3000)=nil, 0x3000, 0x1000006, 0x11, 0xffffffffffffffff, 0x1000) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="6c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010063616b65000000003c0002000800050000000000080008000000000008000a0000000000080010000000000008001100"/84], 0x6c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket(0x10, 0x3, 0x0) close(0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) close(r3) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000180000e4ed08000500ac14140008000200000000000800ffffffff080001001679110030a3344f8c20b07adcc3283700b001aa0d39516b8cf8b47e987ccc8c89ebcb3b66b0d80b74a94bc27c71f5e81f99556b9a42402b710000368715913716acfa1cced09c31b3f2cc11c8962b8083b890d73f6740c9cb177dd63c46d11684b766d4825ba611da8d3ad65cf92b7619c82b43664dd0fdb042eede85b3755a0c425099b6ea596630abee", @ANYRES32=0x0, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c015}, 0x20) [ 1474.930822][T15776] IPVS: ftp: loaded support on port[0] = 21 15:55:17 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000120000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1475.229046][T15773] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1475.255118][T15773] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x204000000000000}, 0x0) 15:55:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf000000}, 0x0) [ 1475.289063][T15778] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1475.387783][T15778] device ipvlan837 entered promiscuous mode [ 1475.688534][T15776] virt_wifi0 speed is unknown, defaulting to 1000 15:55:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1475.772705][ T29] audit: type=1800 audit(1591890918.023:722): pid=15780 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16294 res=0 15:55:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x10000000}, 0x0) 15:55:18 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000006120000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1476.285674][T15778] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1476.298800][T15777] IPVS: ftp: loaded support on port[0] = 21 [ 1476.356104][T15778] device ipvlan838 entered promiscuous mode 15:55:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x300000000000000}, 0x0) 15:55:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b50535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1477.089286][ T29] audit: type=1804 audit(1591890919.323:723): pid=15815 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/975/cgroup.controllers" dev="sda1" ino=16294 res=1 15:55:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x11000000}, 0x0) [ 1478.387976][ T29] audit: type=1804 audit(1591890920.613:724): pid=15855 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/976/cgroup.controllers" dev="sda1" ino=16294 res=1 15:55:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1479.472244][ T29] audit: type=1804 audit(1591890921.723:725): pid=15865 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/977/cgroup.controllers" dev="sda1" ino=16294 res=1 [ 1479.589047][T15839] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1479.611360][T15839] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1479.659596][T15841] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1479.736146][T15841] device ipvlan839 entered promiscuous mode [ 1480.192570][T15857] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1480.206396][T15857] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1480.240629][T15858] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1480.260111][T15858] device ipvlan840 entered promiscuous mode 15:55:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x400000000000000}, 0x0) 15:55:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12000000}, 0x0) 15:55:30 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000130000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b60535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000014002101000000000000000002010000", @ANYRES32=r3, @ANYBLOB="0c66122c33000207022eba65"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8, 0x5, 0x9}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) ioctl$FIGETBSZ(r7, 0x2, &(0x7f0000000000)) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="6400000030003dfa000074317be300000000001050000100340001000f000100747d6e6e656c5ef100000000000000000000000000001c0002000000000000000000000000000008000000080000000000000400060000001f0c00000000080000008173000000e15b17892013b69dce169a0498a7b69fe6245b5029f84607510484560b41b6fb877bd05d5ab3171c09e86183c4832286df7aeca9f3c9729a5be66c811385191be03cd002dbe0d8bb6ac4092e8a"], 0x64}}, 0x0) ioctl(r5, 0x0, &(0x7f0000000080)="b64a8eeeec47b65700adcfa572eea1e03146007825bb5713ee1425392b8c5df9efbe2939b65f03ecc976b3284a45eba6da31d9b7a75b10c7167e12cfe96df4ef05f6625d2a015076398a5fe401b6e8aaf02739ce878364ab94c5d516f16ccb09b71cd4f6cfc65f9bf9f513db77d3466005fe3d7a8e7ebe49176c3f78f3b6a7c098ed590326d83ed6405225bd62ad") [ 1488.025611][T15906] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1488.057895][T15906] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x12060000}, 0x0) 15:55:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x500000000000000}, 0x0) 15:55:30 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000003f0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1488.470093][T15916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1488.491831][T15915] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1488.553659][T15915] device ipvlan841 entered promiscuous mode [ 1488.592936][T15918] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 1488.811152][ T29] audit: type=1804 audit(1591890931.063:726): pid=15911 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/978/cgroup.controllers" dev="sda1" ino=15921 res=1 15:55:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x13000000}, 0x0) 15:55:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x600000000000000}, 0x0) [ 1489.039582][T15920] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1489.049247][T15920] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1489.092429][T15925] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1489.105821][T15925] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1489.122581][T15912] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1489.134360][T15912] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1489.350325][ T29] audit: type=1804 audit(1591890931.583:727): pid=15946 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/979/cgroup.controllers" dev="sda1" ino=15921 res=1 15:55:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1489.835627][ T29] audit: type=1804 audit(1591890932.093:728): pid=15953 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/980/cgroup.controllers" dev="sda1" ino=16113 res=1 15:55:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1490.398553][T15915] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1490.415737][T15915] device ipvlan842 entered promiscuous mode [ 1490.430018][T15916] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 15:55:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b70535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1490.589903][ T29] audit: type=1804 audit(1591890932.843:729): pid=15962 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/981/cgroup.controllers" dev="sda1" ino=16113 res=1 15:55:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x801, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000001c0)=0x2) r1 = socket(0x1000000010, 0x80002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x2b, 0xa, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0002000000000000280012000900010076657468"], 0x48}}, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r5) connect$can_j1939(r5, &(0x7f0000000300)={0x1d, r4, 0x3, {0x0, 0xf0}, 0x2}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="0009000000000000f1000000080001006270660020000200060008"], 0x4c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 15:55:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3f000000}, 0x0) 15:55:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x800000000000000}, 0x0) [ 1491.240130][T15966] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1491.249763][T15969] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1491.271265][T15969] device ipvlan843 entered promiscuous mode 15:55:33 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000400000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1491.741043][T15969] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x900000000000000}, 0x0) [ 1491.777972][ T29] audit: type=1804 audit(1591890934.033:730): pid=15994 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/982/cgroup.controllers" dev="sda1" ino=16097 res=1 [ 1491.788376][T15969] device ipvlan844 entered promiscuous mode 15:55:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x60000000}, 0x0) 15:55:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b80535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x65580000}, 0x0) 15:55:34 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000600000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1492.771830][ T29] audit: type=1804 audit(1591890935.004:731): pid=16026 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/983/cgroup.controllers" dev="sda1" ino=16097 res=1 15:55:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa00000000000000}, 0x0) [ 1493.012464][T16014] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1493.054366][T16014] device ipvlan845 entered promiscuous mode [ 1494.921683][T16030] __nla_validate_parse: 5 callbacks suppressed [ 1494.921694][T16030] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1494.941286][T16030] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1494.951209][T16031] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1494.980603][T16031] device ipvlan846 entered promiscuous mode 15:55:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000030003dfa00000000000000000000000050000100341d01000f00010074756e6e656c5f6b657900003400028014000b000e0000000000000000000000000000001c00020000004000000000000000000000000000000000000000000004000600000007000000000000000000000008000000000000000000"], 0x64}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e20}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="22f9cd885d2f958a4aaec13abdf1f1a3e9d97b7df49286c07f9f91e9e4508de16e228b9f033dc1f6dc7e567e9055eefd47e569a85485d5ceceab895fbab9308c202a3677691917899f73cc875e0cfa836e492e1b07675fd254df17628f89b59071dfefe9a674fd167d73872259da7d91e77a0c4f2c2d5af1f7566dde53ceca71b51e8274cfc76134774092a8465fd2ef8ebd537df20ce443a0ac2e77c1eb4e13368ec6dc8e365883e03f96c4bd7a9efadd58bac5adaba48376d353b404", @ANYRESHEX=r1, @ANYRESHEX=r5, @ANYRES64=r4, @ANYRESHEX=r2, @ANYRESHEX=r3, @ANYBLOB="a0496d944a6a73a01cece611a8bf8d25c72b08f97a81a27ca93fc47185718c139f67f835f04c5b960af5184e86c2422e13d1954f1846e8a6993b578bedebad5fcee843d9d5fd00ba688397c48669a39eadd6947ad4a4", @ANYRESDEC=0x0], 0xfe90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140003007866726d30000000000000000000000014001200090001007866726d0000000004000200240004000000000200"/84], 0x6c}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140), 0x332, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000007060103de1424a12ee50000080006405e210abb00"/36], 0xfffffffffffffd15}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r6, 0x0, 0x100000000) 15:55:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x81000000}, 0x0) 15:55:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025b90535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb00000000000000}, 0x0) 15:55:37 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000058650000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1495.629341][ T29] audit: type=1804 audit(1591890937.854:732): pid=16062 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/984/cgroup.controllers" dev="sda1" ino=16228 res=1 15:55:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc00000000000000}, 0x0) [ 1495.707673][ T29] audit: type=1800 audit(1591890937.854:733): pid=16062 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16228 res=0 15:55:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x88a8ffff}, 0x0) [ 1495.751230][ T29] audit: type=1804 audit(1591890937.934:734): pid=16059 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/984/cgroup.controllers" dev="sda1" ino=16228 res=1 15:55:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1495.926543][ T29] audit: type=1804 audit(1591890938.154:735): pid=16069 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/986/cgroup.controllers" dev="sda1" ino=16210 res=1 [ 1496.099381][ T29] audit: type=1804 audit(1591890938.324:736): pid=16078 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/985/cgroup.controllers" dev="sda1" ino=16298 res=1 [ 1496.169941][T16079] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1496.251973][T16057] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1496.277248][T16057] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1496.301126][T16063] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:38 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000810000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1496.362743][T16063] device ipvlan847 entered promiscuous mode [ 1496.491708][T16054] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1496.504381][T16068] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1496.520877][T16068] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1496.541882][T16073] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1496.568697][T16073] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9effffff}, 0x0) 15:55:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe00000000000000}, 0x0) [ 1496.655588][T16069] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 1496.664817][T16069] A link change request failed with some changes committed already. Interface xfrm0 may have been left with an inconsistent configuration, please check. [ 1496.682924][T16067] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) pipe(&(0x7f0000000440)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) pipe(&(0x7f0000000340)) socket$inet6(0x10, 0x2, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000100)=0x5, &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$tipc(0x1e, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100006800) [ 1496.756352][T16067] device ipvlan848 entered promiscuous mode 15:55:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ba0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1496.973179][ T29] audit: type=1804 audit(1591890939.234:737): pid=16098 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/987/cgroup.controllers" dev="sda1" ino=16210 res=1 [ 1497.165854][ T29] audit: type=1804 audit(1591890939.424:738): pid=16105 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/986/cgroup.controllers" dev="sda1" ino=16302 res=1 [ 1497.708687][ T29] audit: type=1804 audit(1591890939.964:739): pid=16098 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/987/cgroup.controllers" dev="sda1" ino=16210 res=1 [ 1497.857341][ T29] audit: type=1804 audit(1591890940.074:740): pid=16118 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/987/cgroup.controllers" dev="sda1" ino=16210 res=1 [ 1497.888968][ T29] audit: type=1800 audit(1591890940.144:741): pid=16098 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16210 res=0 15:55:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb6020000}, 0x0) 15:55:40 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000ffffa8880000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1498.242014][T16106] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1498.332234][T16106] device ipvlan849 entered promiscuous mode 15:55:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf00000000000000}, 0x0) 15:55:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1498.391345][T16121] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1498.469315][T16121] device ipvlan850 entered promiscuous mode 15:55:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bb0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x3, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x3a8) socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="d00000000201010400000000000000000500000884000180060003400004000006000340000000002c00018014000300fc0000000000000014000400fe8800000000000000000000000001010600034000010000140001800800010000000000080002000a0101020c080280050001003a00000006000340000000001400018008000100ac1e010108000200e00000021c0004801800028005000100400000000c00034000000000000000030800154000000003140005800e000100736e6d705f7472617000"/208], 0xd0}, 0x1, 0x0, 0x0, 0x4000800}, 0xc000) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$l2tp(r4, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8983, &(0x7f0000000740)={0x7, 'bridge_slave_1\x00', {0x4}, 0x7fff}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="65350600050000001c0012800c0001006d6163766c616e000c00028008000100080000000a000500040000000000000008000a00", @ANYRES32=0x0, @ANYBLOB], 0x50}}, 0x0) 15:55:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:42 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000058b0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffff}, 0x0) [ 1500.231390][T16149] __nla_validate_parse: 4 callbacks suppressed [ 1500.231401][T16149] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1500.256308][T16149] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1500.266678][T16151] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1000000000000000}, 0x0) 15:55:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1500.354154][T16151] device ipvlan851 entered promiscuous mode [ 1500.441496][T16176] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0xd0, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_UNACK={0x8, 0xb, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_TCP_TIME_WAIT={0x8}, @CTA_TIMEOUT_TCP_LAST_ACK={0x8, 0x6, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8, 0x5, 0x1, 0x0, 0xba}, @CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0xfff}, @CTA_TIMEOUT_TCP_ESTABLISHED={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8}, @CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0xd3}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffe00000}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1f}]}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8}, @CTA_TIMEOUT_TCP_SYN_SENT={0x8}, @CTA_TIMEOUT_TCP_SYN_RECV={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9000}]}, 0xd0}}, 0x0) [ 1500.510964][T16176] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1500.559945][T16177] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1500.642923][T16177] device ipvlan852 entered promiscuous mode [ 1500.667870][ T29] kauditd_printk_skb: 4 callbacks suppressed 15:55:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1100000000000000}, 0x0) 15:55:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bc0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1500.667886][ T29] audit: type=1804 audit(1591890942.924:746): pid=16193 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/990/cgroup.controllers" dev="sda1" ino=16296 res=1 15:55:43 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000ed38ea6075df9f690b387174f1a8b625ff1efe817c27a7b0c9622b596a5502eb54b86b171ed9910507061c735c15d283ee6ac27a30d40fd275f49713445031"], 0x5) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x0, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x5c, 0x0, 0x8e6767b8eef245b5, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x5c}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x30, r6, 0x102, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x94b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYRES16=r6], 0x1}, 0x1, 0x0, 0x0, 0x4002}, 0x20008801) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(r7, &(0x7f0000000240)=[{&(0x7f0000000580)="1ee7f5c114f301897833b4ee5be81e76b0076a46b2f7468ac5628e1a4502b57bb5f20e619b8a81fcb84e9ea4131068bf3aed3b7f0e007ddc92d0785cccca837fb113143bcacf5837ecb45ea8cec8471e0d89d488e6d3c581377665cd9521f2be87e400768b0b1de3b80e0aa35daadea65ee311e7250176bcf7c2a2acf8c1599c8dca183eb4d5337526f9d9e845777c4a9aaaad56d2312b5fe498fce90a66ffadc8d2308fa680da948fe4ea290f5c7fd8e9b3ea5e7903e5d594493ead330bb69afbfe0e6b6abb875ae494983d07f6ad0f205c78e766519378c4e107daea6c96e9a4670308823ca2dd0833422d9db3994f3e7d334239a907c30f07719b225ab969f2f94f771caebc2a93c7eb7e3b1bc89cf230e44b16c1089a3650854aeb790527e2ed4cf2423ae96d49341984278612080fa8e37f942157bf6c91c5624514d54a81b13f59c05b2fa88691e49febd3783222666f2fdef3c186d2351aa606799e81ea0fb2e5ec9fc177a5bf680a2d762ea95132d0f6a03c26ce673432fa6e2a3dc43382ecce2ac519f2c6b46be91be490c2f8fcb9a6e8406c539141dab66863cbff550b2c87cb28579e20aaa73cd3b31fe5727fa1ce0f3553eea94404c7c57eec102cdeba890c61a16a193dc547cc0bb4e47fa3ff2a4688595ea0b11ccb246738dfd6a1c3068d96bb66a5dc78beb2e393ceebca4f0732b105066a1c245ee81c73d596167c0fc3e951dcac688e3409540babf69ccec8bce750e45b3c4d6e62e0a5e29bc0125425dfddd6be09a325363b9bb828e6fe6872b56058f1132fef1c61c1f236c5a06b27537d71a850d604c5219eb4df9057354cef00e70309da12e213d9961917278423df7c3ab98624768f25ef4e88555564dc322a87d934d9ad0de3f1e39c5f946b802139de1d05d9460ad7e978b26f01facea7a2acc23f1137b39f6442d60d38847641775907f0e9a97fb082d8882993135a90a98e1585783d5dc572a7c973f52cd92d190cfdb4e76171a4244af33ec5e08b831e992cbbeabe0826a842ae97e1b3007afe805879996243a1b2d38984f79638b8f59fffa2c58325b1905ba01c59f6880d4694eb554634ba67f55d888174f612a9bfe525eb15c140bfee07a90507398443413579f37a54650fefc53f14a879a5b857a1b8c6e38e91cc2540202cef81a51492698c3440cca2b6b100706a07da142f168d7819ebf95e7e8b90ae2f0873e3081a94aeef87152dabafccc7fd633e452b7ab28a3ed00ff0944cd23cd547989fc6a073bbf3b8013420eb018c7fdf288cd8e1a570e2671e5adf216b29f1c9c256fd50293da7dffd0b2cd186a8463c177738c74a8f2297ef231d316ce83b0f80b31c084f4d7d8fa5b38b6fc3d99969966900fb80412faf568caf6858cddf0df0a6a475e54e97a406a399e9a03e683ecaf46dcd8fc1333001c60fa107deb60bc3be8f57164aa6de9837459703db42ea692cdcfbf0d9ef1c0bb2a678223b430a8158b413d823eb32e2cdf4a46daaa92f4dc2dea2e1e695bf9fbc9defc666031a350f611ffd7e31849571249b110b6f342133aa1bfd85b19228e9168c4716ed79cbc3660bc3f5074ef54d6a2a812c7cf8c45a34ed75d0fc5ee9f6d28d4a8cda52881d230238bc2d64074a8b4d74b93a3eba4d001f9287eae3d563f61221c62ceb067b0a4989f547e62c40f89401fb812715b256e4533218b9c110e4c2eb9ecfca5ff7f47280d0b3982614136cbac13da0ecb2dda3e183272b9d88a56f0b236d05eab7a2df18861b75b92d75271ac8cfdadb98485038255fcf58a507dbbfae77ecb40b6cc6d480abddafb148e82a3172c96654681e6c9bc2e33c5ea9ec6076d06fc49645e8f9a5c1508eb0d7f16b6001239604774e3f930da93b08753653058c5d30c8c05ffa5b7ff803406f71784a5e9953ee05011e9f43b4aa4701803b2d6565bd2e793f0652cbe64d90de7315c88be38c74824b31ae0ac98eb53b72d38633b57c079c6966694b50c3f9e597cd5e3554f84175c4baff9fbcf5d46fcc6da1a8bce3cfe069acc7c8b7868c14f6828bce0600359297c1a2e14045abcc89423004f40b1eccea9343b92ee66cbfb18ae8020d108b71a7fdbfa1c388bb61e5a88f09d540b353505ed53b295fbd74a6fb8b029692c2984750faee3ad0994fe1510c919130d9e8728ee0045dda84768e8305eb8e64edd2b656f7179b00cde3b5d06540f27c825cb76cea2b6897c8cd6dc6fae066d8c591c62a295417dc3d1830bf4b6df2c93a7a5c9cd638134dd4f11675bb4356519d954f212e8c81be12e276502e552157e3461b4bc57edcecf0de045b7e17ce92992a6918f56ed799f40900af58d30d3c41875a6e1ce1ec968359a91c7db681775ba97e50fc29ea0d61e8abfed0796b6459617243eb84342d1a6f80d7ddd5c9ef8eeaddee5e5af1a09c185b0c6f0499ca6641558cc9f0d68eb0d64db5be28c84f3f0b42bb8fa1a324b9fa0a3d643b8a2b338daa632a23a90d1408d69ee3cdc42340d3e6d849b8118c55d0956c287608129c0c223d97e11b7ac92d50ddd334a64486bd3ca4a799c56dbf47612d53d04b85585f52870a8f3eb013399d770e062ca559253e3a9415c8f13c37d99033ffcb1e7aa4aa4d459e0d45526533f88e25498a128bb382fca690b954b0b1c5eda8f861bd646ad0cc0b3c3307fa0ca7c2f8bc75bf02b3b70ea9bb3a96dc3f7b2ceddc64d882230fd946fd8770e67461b07c6912b38fc7ee7cc61cf50cbaacafa9dae74938baa4d9d0f42c2b7dd260f55d69cd59695a801286a02e7b2f9babad3c4392f869cdf130ba44a7817f102d249753910d4cb1720496927f8bca22aad4e974a5d0eca972ab06e0659c0a50c76873b833cca0f848a902e7197d7de17677479fb19304a97fada0003e9da14b52213b2f773ea433cec51ed827c746526f80e1c83fc51071507f5ed580322c70d14a2f61e0d6f7ff5c1229cd18f911f9e12c81e446e0f9aa841375bd748565e3336592ca918eb7c1f4a53b7f6fa79433b740891f552272841a938659801430e334b6b07b0ce53374ba61e7670c0916bdcb72e8b4743ed1766e9de27740830803a2395c93c5a1f69eac4c63f1233aa0a0a5bfcfa245a48c102c9e269013f1e6232f68f2ff2b85de88dcd36551b33e0df4238f4b7fc1b0a085a64590638d1e5a33f629c50bd52b23d3e6e69e92de9c8b7fbf86f8a48fd295a7208ee5832902e5733f278b6aec017a6af96fd5f0edc684b64f98e2de1d8d2d123b342d371434edfdb8544c118f3f7de298de0791a1dab5fd57c226d4f9dd80fabf97b5f466d79d94082ea9a9187ed1522de02101fa392c37ae3685ba8d1364a1638736d2da2d02e898c5fa450787b3df83cdcb874aca56fb4f5bdc9bdc2e9ad9fe8c8656fa38d4e4108a743064dce0ae29c12d4bc7405b91108787fb01644486fbc4f025171f43b434d978155ace6410b002b3ab687dbbe293d63927b13f46a0ecf2eb713776a0d49933e4182d583040922944b64968a197e81d10ea61e9e94858a8dea185ba39199ce58707f481b2533db5ef4c9d23fb99af2216a16fadae47e2c02d9b194e82ffe1700261b643625c959d54027835bc9223e90172b424bc1e43c963011c6b99e5acad01af3887e7ae25c2d55cb343cf98abf597df0af80d6f125223af1320ebe321ef16b7e1468ff2ff5629358030fa4769f1a34f79042843fe34c0869d048af49f21efb9862d0bad4b656e4f50580e785fdf64abd80c30338c23ce0924eb15a81d8b8a53d98161689e1c65ad1d418b4465f253b3f5744d312e8797ae7ef4b02ddc3fe967d2f964a1982492091f291825e1b6bdbff55379e92326c02831ce60ee4726a0cab569013b4627715b18ccaa581423533a3b9fdd4bd31883c5ca7a4bd64e98991dd0945da4a93f10eaab9b78048b849afc46c6f821f0202c30cfa5269ed30bb5db43664c5a9446b251d6baef27bfb013480643538efabb2d68f35f58ecfa15e82df792ac98f2a91b1740295fbc75f72cc360d80c8ef3b625627b0d77c5c271016d0a2dccf356b1e4014c9ea0aa6a1994a58a76edaf81e4da523765a43a6ff55c8f50f36e21b3d424ae4d22bada8c82ff0c46b44047e2799c82833d55c7cdacf0f4eb56eec81194b56fe4dae86d6b435f8430597c21005411cc85bbd594730f9b6b32c7c77b11508892e7aa2b5f6462f9767b379ac728cff76d362111b1eadbfcc546a932fcb6eead0af287cab04923c17df8504200c7cc7e6b94edb1bbe38953b7161b4e060d01644a05260b5c5ed5939a82141b59699a65280aee4facde049af4cbabd7a924a3cb95ad8a88ba750c33671b8907384c80b7e9c7778f895aa4c940a03783e6b83e7277d095f640090b004a16e1db0440d04ba0d27a43fba1fcff2044132b4a43e302c28577a626e8d813701bb874aeb4834dfe4fce9e811b6c7b4be9ecd2824dd6e65388f3f8c723706710b40c12b2eb16d64119e70867878e3137932e626509b7d54fc653d501bd658bfaedf8c5001a3444c98fcfbd0a5d81fb40cabf4c7b78298992fd7f033f85175e156f5a0bc6afd1d72697729fcb80531b80a487e4e62d961e47c5459a71904f87d5d276dcbf2084f8d1f60830e73bd4769bfe5ab9e11c2d7a9cad1f3217ad363d492c644d7c8da4afe23eb654e89c473d6693e6b6b47efba48451231330639cc38f474494facfe4ccfd630d79cfe116d7e9d01cc44d60bedbd0b571d0a4acadde04e07d8257ff3b033df11c6b45d9a228d0df7486854451bbf63c4a7fce803cf946e73d341b6a6f13d168ac1679329eb456d7671308f466d423b93ff65d322fb5828f3d7bcd3e7b3edab2e0dff2dd0c9d5fa360a5045b072e166a78a37d5eb3519110a0bc561b2e1a515d3d199872bed29628b9ec1bb1ff3591672f7a2724f12786b7b76fcd5f527cc0f8a2ba7234e2a6af08dd7cbe9ad47f2449524d2b4d80606134e4cec65fca19a2841b0c671d8143722bc03fed54d6f4dcacdf759c2b9a58a6f57a7cb9362efaff5783b4a62649a17010f4df5ecc1637978d6915b84a96beb89d2eaede837568daa663d4fe0c5f620a387a414be97defbe842ebec2f3a393d039131c8c1adf2a6fbd672db32dff65f4202e848f5864860963fd78c91b6c3daae5faceef20aa79c6e58cf75ed31a30c4f1bee658bf3604c05cf0678b866605d0dfdea06089ac4f9c9b48c85001fb7055b91323330bb0f20e70a921e9fedd56b4417f65e5d5a7a70091ad74457a5ed496a43bebff391df1a0c804640170852fed4f9d67a09ffffd855f06b195949f3d10728a3abca346a504b4f06adde29cf25bbc1b8f67d57115980b51b9d4b97eb8f38f964ad77e3519e0f55a1cc9cca97c306af1c15922999f83ab69e9d31d27db236641f6f4e3c0c0f77f5ac239bd845e10cb1cbb8e30a33cce092c34960b6516623f8215db75a2bd2d1f40d4654d93343481153a62d0e14fe6c7b516f997693f922af2f539ba947bd78ff07edae96b4991586dab11330747c4bfb7e6141158d3d1919bae4cebc42fcae9f9bd5afa97aa780986b9b63d8c3468ced5c048a15d4fd6eca42c011f647c050e6bec74fedf0050d33b6a236f0fede42adbeefa8b27ae3529c704aa36919de44a107cf48273a4bcd3d957556e4cef5a4cde7d97a025dc065563a65c067423b7c55563e3c54922cc4dee577837e22158e594e347e980fc95bb6120eb6f03878011afcf17880b10c8944cec66069887771e0ef28f879f3fa4ea570d7359572a07b325910dc545", 0x1000}], 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 15:55:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1200000000000000}, 0x0) [ 1500.898124][ T29] audit: type=1804 audit(1591890943.154:747): pid=16207 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/993/memory.events" dev="sda1" ino=16297 res=1 [ 1501.025660][ T29] audit: type=1800 audit(1591890943.154:748): pid=16207 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16297 res=0 [ 1501.095985][ T29] audit: type=1804 audit(1591890943.164:749): pid=16207 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/993/memory.events" dev="sda1" ino=16297 res=1 15:55:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1501.629414][ T29] audit: type=1804 audit(1591890943.884:750): pid=16228 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/991/cgroup.controllers" dev="sda1" ino=16296 res=1 [ 1501.779709][ T29] audit: type=1804 audit(1591890944.034:751): pid=16214 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/993/memory.events" dev="sda1" ino=16297 res=1 15:55:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1501.883339][ T29] audit: type=1800 audit(1591890944.034:752): pid=16214 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16297 res=0 [ 1501.910922][ T29] audit: type=1804 audit(1591890944.064:753): pid=16218 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/993/memory.events" dev="sda1" ino=16297 res=1 [ 1502.015198][ T29] audit: type=1800 audit(1591890944.064:754): pid=16218 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16297 res=0 [ 1502.136040][ T29] audit: type=1804 audit(1591890944.064:755): pid=16221 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/993/memory.events" dev="sda1" ino=16297 res=1 15:55:44 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000ffffff9e0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1502.481242][T16206] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1502.490574][T16206] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffa888}, 0x0) [ 1502.530325][T16209] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1502.551494][T16209] device ipvlan853 entered promiscuous mode 15:55:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1206000000000000}, 0x0) [ 1502.644902][T16231] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1502.669474][T16231] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1502.761695][T16233] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1502.785764][T16233] device ipvlan854 entered promiscuous mode 15:55:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bd0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000030b9b15fb15e0012800c0001006d6163766c616e002000fb7f0800010010000000080003000300000004000500aaaaaaaaaaaa00000a000500040000"], 0x5c}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001200)={r2}) recvfrom$l2tp6(r3, &(0x7f0000001240)=""/213, 0xd5, 0x0, &(0x7f0000001340)={0xa, 0x0, 0x0, @mcast2}, 0x20) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001380)={r5, @in={{0x2, 0x4e23, @loopback}}, 0x7, 0x7}, &(0x7f00000010c0)=0x90) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000000)=0xffff, 0x4) 15:55:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c7800000"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1504.246944][T16289] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1504.436266][T16264] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffff000}, 0x0) 15:55:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1300000000000000}, 0x0) [ 1504.500634][T16268] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1504.521743][T16268] device ipvlan855 entered promiscuous mode 15:55:47 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000fffffff00000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1505.043630][T16287] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1505.105628][T16287] device ipvlan856 entered promiscuous mode 15:55:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff7f}, 0x0) 15:55:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000000000000000}, 0x0) 15:55:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025be0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c7800000"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r2 = socket$netlink(0x10, 0x3, 0x13) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x54, 0x0, 0xc384c74627fce414, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_FLAGS={0xc, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}]}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x1ff}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x2}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x10, 0xbd, [0x0, 0x0, 0x8, 0x1, 0x200, 0xf462]}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x1fc}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x1) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="1303000400000000000003"], 0x3}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100000002) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000042c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='P\x00', @ANYRES16=r6], 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="020025bd7000fcdbdf25010000000c0001006e732f750700720006000b000b00000006000b0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x8800}, 0x4000006) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r6, 0x202, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xf}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048800) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r5) getsockname$unix(r5, &(0x7f0000000200)=@abs, &(0x7f00000000c0)=0x6e) sendmsg$AUDIT_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6558000000000000}, 0x0) 15:55:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c7800000"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1505.796520][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1505.796535][ T29] audit: type=1804 audit(1591890948.054:760): pid=16321 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/996/cgroup.controllers" dev="sda1" ino=16258 res=1 [ 1505.936523][ T29] audit: type=1804 audit(1591890948.154:761): pid=16329 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/996/cgroup.controllers" dev="sda1" ino=16308 res=1 [ 1506.049088][T16329] __nla_validate_parse: 7 callbacks suppressed [ 1506.049098][T16329] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1506.162139][T16312] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1506.175982][T16312] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1506.187111][T16318] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff9e}, 0x0) 15:55:48 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000000000fffe0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1506.215554][T16318] device ipvlan857 entered promiscuous mode 15:55:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8100000000000000}, 0x0) [ 1506.278963][T16338] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1506.301461][T16338] device ipvlan858 entered promiscuous mode 15:55:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025bf0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1506.542742][ T29] audit: type=1804 audit(1591890948.804:762): pid=16328 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/996/cgroup.controllers" dev="sda1" ino=16258 res=1 15:55:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1506.731031][ T29] audit: type=1804 audit(1591890948.984:763): pid=16352 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/996/cgroup.controllers" dev="sda1" ino=16258 res=1 15:55:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x2, 'vxcan1\x00', {0xb2}, 0x90ad}) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="40000000001fff00000000002000000000000087c002fd9678a31863d46e7ec25cdbce5970f9395a8a6843f79f5ab987630cd4ab2a866c", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0x0, 0x0, 0x20048844}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)={0x73c, r2, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_SMPS_MODE={0x5}, @NL80211_ATTR_BEACON_HEAD={0x421, 0xe, "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"}, @NL80211_ATTR_IE_ASSOC_RESP={0x2ed, 0x80, "f14ac5cdd8c65e3d0723c62318aeaffc4d66e6ae5edcd5a0d8cf572c79b446495ec68d992690e7c99a2f0a34cbd911a3cf577b1d8c60baaaf4c8da8fa2af8e31b49ab10a8f6a3d7d9c4930982a5a92385b48c9c775919569fa6fa9f0b426dc254fe6bbc0ef3e7df72267070550713c9a447f2f39dbaec080ea8aa1137ebb9f71d3c43a8fb87fedbded2602e17331a670ccc9f8a92f1059e0ceb97c6929c3bc537ce3e2e175a1f9a571b984d110861d1b6080b66294072b98fdd6d4d4fc440087d6d1b03bb0463eef700ece5248c4eeb40690ef23fce1df48cc5a4468797a18133bc9f80f4fdf574a002c70879ec4ca1ecda1c2706d87931d5ce1fa02490fc83a3a42a722ec5b937f27b683686eca034ac23f12d5e52f25b886a7de0ad8816b3fc677b790399412d10f0045f1cdee554a4d7ae4d67fc69945a999f33117a8e2d791df00ea8d5df81f7d74726097c99ba699bd31195778482e551fdf091eb9a0b79e18f413b469104ec64c0b2ad8b23b61d0918708fa3cba427cdc24538950866f8e7a726e301b20b33225c68bfb8a77d2822d21777961590c27a415b6256654feb5bf8fe13e9f7d6568d4913d42061906ab53e6919bf314556bfcd4fb4c1bdc0e9c1ba676a92027c9752995f6ab8a84c8f76dbfabc4000be9b21e2498cf93c7f776838a944cd1b7d212a645570f4bf2432df152a7931fab715ca0c845a2946726fcabc375ebba93bcdca4df529155bce20573fc2bacaa5ff5c97f3c8acd43134826f3e841b27ceefbe5e2f9ff0d98f8bbeb37290a36c70dd7c13d88a784666d7c529278bda9afacbb6eef0f0ba97cc7fbb638093f99955b336b18952e44b3a48df15e8b09dfb6b54f521c43f7b7cdb5ed1d84c652ef8a0ae81e1d7984df1efc9a285e2aae99e10655728610ef2c9bf356c70997ffcfebc6147c0db4693b89bb2c6c3438b1e1b6dff556573d3f11b89eaf467f870573d30877d511c446641e2c69ec6714d6d018eb37bd7301246c88b5208dcc5482246aa11154173c14b14bfb588c32fd772bb2bef90f"}]}, 0x73c}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) [ 1506.893752][ T29] audit: type=1804 audit(1591890949.154:764): pid=16363 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/997/cgroup.controllers" dev="sda1" ino=16309 res=1 [ 1507.055586][T16361] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1507.927313][ T29] audit: type=1804 audit(1591890950.184:765): pid=16381 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/998/cgroup.controllers" dev="sda1" ino=16309 res=1 [ 1508.077465][T16381] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1508.551698][ T29] audit: type=1804 audit(1591890950.814:766): pid=16386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/999/cgroup.controllers" dev="sda1" ino=16309 res=1 [ 1508.678971][T16386] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1509.502183][ T29] audit: type=1804 audit(1591890951.724:767): pid=16391 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1000/cgroup.controllers" dev="sda1" ino=16309 res=1 [ 1509.674407][T16391] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffffff0}, 0x0) 15:55:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x88a8ffff00000000}, 0x0) 15:55:52 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000010400000000000000000fff0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1510.061364][T16351] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1510.080999][T16351] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1510.156410][T16354] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1510.224215][T16354] device ipvlan859 entered promiscuous mode 15:55:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1510.271317][T16372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1510.291317][T16375] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1510.353979][T16375] device ipvlan860 entered promiscuous mode 15:55:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9effffff00000000}, 0x0) 15:55:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x40030000000000}, 0x0) 15:55:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c00535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1510.563514][ T29] audit: type=1804 audit(1591890952.824:768): pid=16408 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1001/cgroup.controllers" dev="sda1" ino=15745 res=1 15:55:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4400c000}, 0x24048891) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0xfffffffe) syz_genetlink_get_family_id$SEG6(0x0) 15:55:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xd102000000000000}, 0x0) [ 1511.042506][T16420] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffffffffff}, 0x0) 15:55:53 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000000007fffffff0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1511.126009][T16420] device ipvlan861 entered promiscuous mode [ 1511.154115][ T29] audit: type=1804 audit(1591890953.414:769): pid=16427 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/999/cgroup.controllers" dev="sda1" ino=16310 res=1 [ 1511.263881][T16425] __nla_validate_parse: 4 callbacks suppressed [ 1511.263893][T16425] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1511.314844][T16425] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1511.342165][T16422] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffff00000000}, 0x0) [ 1511.407917][T16422] device ipvlan862 entered promiscuous mode 15:55:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x100000000000000}, 0x0) 15:55:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1511.804813][ T29] audit: type=1804 audit(1591890954.064:770): pid=16454 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1002/cgroup.controllers" dev="sda1" ino=16307 res=1 [ 1511.937542][ T29] audit: type=1804 audit(1591890954.195:771): pid=16425 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/999/cgroup.controllers" dev="sda1" ino=16310 res=1 [ 1512.148496][ T29] audit: type=1804 audit(1591890954.405:772): pid=16457 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/999/cgroup.controllers" dev="sda1" ino=16310 res=1 15:55:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b0005000100"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1512.770261][ T29] audit: type=1804 audit(1591890955.025:773): pid=16465 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1003/cgroup.controllers" dev="sda1" ino=15779 res=1 [ 1512.966579][T16456] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x200000000000000}, 0x0) 15:55:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff7f00000000}, 0x0) 15:55:55 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000000ffffffff0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:55:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c10535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1513.013079][T16456] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 15:55:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x60, &(0x7f00000000c0), 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'vlan0\x00', 0x1}, 0x18) [ 1513.137677][T16472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:55:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffffffffffff000}, 0x0) [ 1513.252051][T16472] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1513.272394][T16465] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1513.295205][T16476] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:55:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x204000000000000}, 0x0) [ 1513.366722][T16476] device ipvlan863 entered promiscuous mode 15:55:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x300000000000000}, 0x0) 15:55:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b0005000100"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1513.950822][ T29] audit: type=1804 audit(1591890956.205:774): pid=16499 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1004/cgroup.controllers" dev="sda1" ino=16082 res=1 [ 1514.112631][T16499] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:55:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b0005000100"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:55:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002a00) [ 1515.858323][ T29] audit: type=1804 audit(1591890958.085:775): pid=16530 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1009/cgroup.controllers" dev="sda1" ino=16177 res=1 15:55:58 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000f0ffffffffffff0000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1515.929489][T16476] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1515.993016][T16476] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1516.050720][T16482] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1516.096545][T16482] device ipvlan864 entered promiscuous mode 15:55:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c20535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:55:58 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'macsec0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRESDEC=r3, @ANYBLOB="03d64bbf05f591aaac2012800c0001156d618376746170000400028008000500", @ANYRESOCT=r1, @ANYBLOB], 0x3c}, 0x1, 0x4000}, 0x0) 15:55:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002a00) 15:55:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2}, 0x0) 15:55:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x400000000000000}, 0x0) 15:55:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x3}, 0x0) 15:55:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002a00) 15:55:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x4}, 0x0) [ 1516.633858][ T29] audit: type=1804 audit(1591890958.895:776): pid=16556 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1011/cgroup.controllers" dev="sda1" ino=16019 res=1 15:55:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100002a00) 15:55:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5}, 0x0) [ 1517.015949][ T29] audit: type=1804 audit(1591890959.275:777): pid=16564 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1012/cgroup.controllers" dev="sda1" ino=16315 res=1 15:55:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100002a00) [ 1517.381248][ T29] audit: type=1804 audit(1591890959.645:778): pid=16576 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1013/cgroup.controllers" dev="sda1" ino=16312 res=1 15:56:00 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000020000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1518.111569][T16544] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1518.122679][T16544] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1518.150495][T16548] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1518.191418][T16548] device ipvlan865 entered promiscuous mode [ 1518.212730][T16551] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1518.280557][T16551] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1518.299189][T16557] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1518.338995][T16574] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1518.358780][T16574] device ipvlan866 entered promiscuous mode 15:56:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c30535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1518.399733][T16579] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1518.412496][T16579] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6}, 0x0) 15:56:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100002a00) 15:56:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x500000000000000}, 0x0) 15:56:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwritev(r1, &(0x7f0000000500)=[{&(0x7f0000001340)='+', 0x1}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x400c084) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2000000014002101000000000000000002010000", @ANYRES32=0x0, @ANYBLOB="0800020000800000711232bc3699718371b1892a9707ce997f63c7dcf4d5f6d0de1a11768074a2e2a063af51703543f948a87afa9b5f360f82d3bb0201f11fc45622e94d3a7cf806124722f5dddd6666f0340c324c460fd8999f5bff21e01f7ea14e5a8325686e8587d6829babc52586c0e0cf0728287b51f71fa996441dd76cbc9cbd322cacf8569953b234cfe494832978e5e1ff3c429536cca1811afe2914c82a011c472fc52a6ec9"], 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x40002}, 0x20000011) bind$can_raw(0xffffffffffffffff, &(0x7f0000000040), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={0x0, r0}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1518.703866][ T29] audit: type=1804 audit(1591890960.965:779): pid=16605 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1014/cgroup.controllers" dev="sda1" ino=16325 res=1 15:56:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8}, 0x0) 15:56:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) [ 1519.043680][ T29] audit: type=1804 audit(1591890961.305:780): pid=16618 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1015/cgroup.controllers" dev="sda1" ino=16330 res=1 15:56:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x9}, 0x0) 15:56:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 15:56:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa}, 0x0) 15:56:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb}, 0x0) [ 1519.371974][ T29] audit: type=1804 audit(1591890961.635:781): pid=16626 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1016/cgroup.controllers" dev="sda1" ino=16330 res=1 [ 1519.950386][T16596] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1519.959728][T16596] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000030000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1520.020415][T16600] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1520.074662][T16600] device ipvlan867 entered promiscuous mode [ 1520.108501][T16631] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1520.185334][T16631] device ipvlan868 entered promiscuous mode 15:56:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c40535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 15:56:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) shutdown(r1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x751480, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0xd) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r3, 0x0, 0x60, &(0x7f00000000c0), 0x0) r4 = accept4$inet(r3, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10, 0x800) r5 = socket(0x2000000000000021, 0x2, 0x1) connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="186ca300000000000000030000"], 0x18}}], 0x1, 0x0) close(r5) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x6) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000340)=0x10) 15:56:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc}, 0x0) 15:56:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x600000000000000}, 0x0) [ 1520.499384][ T29] audit: type=1804 audit(1591890962.755:782): pid=16655 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1017/cgroup.controllers" dev="sda1" ino=16337 res=1 15:56:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6(0xa, 0x5, 0x0) listen(r1, 0xffffffffefffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @local}], 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a840200400402000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x31f, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="2000000014002101000000000000b12002010000ce3071515fc9e29f215b3f778ba195de5bd2dcc80f040cf588db3cfc1e79ce2cc594bb5c1dd69db4e840c6c69427e39d42e8de8dac004ecf8a22fb293ca958efeb01c44b83ce5b1f302bdf069b723f0a155c8a76bb061d490cb8d1ab78585003ad30a5d9dc895a2149aba3135d20beec", @ANYRES32=r6, @ANYBLOB="08000200e0000002"], 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000120000024e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r6, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000003fc0)={'batadv0\x00', r6}) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000004080)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004040)={&(0x7f0000004000)={0x2c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x1}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000015}, 0x4) 15:56:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe}, 0x0) 15:56:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf}, 0x0) 15:56:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x10}, 0x0) 15:56:03 executing program 4 (fault-call:6 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:56:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x11}, 0x0) [ 1521.465310][ T29] audit: type=1804 audit(1591890963.725:783): pid=16685 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1018/cgroup.controllers" dev="sda1" ino=16348 res=1 [ 1521.492741][T16685] FAULT_INJECTION: forcing a failure. [ 1521.492741][T16685] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.516775][T16685] CPU: 0 PID: 16685 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 1521.525145][T16685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.535294][T16685] Call Trace: [ 1521.538607][T16685] dump_stack+0x188/0x20d [ 1521.542957][T16685] should_fail.cold+0x5/0xa [ 1521.547514][T16685] ? lock_downgrade+0x840/0x840 [ 1521.552379][T16685] ? fault_create_debugfs_attr+0x140/0x140 [ 1521.558208][T16685] should_failslab+0x5/0xf [ 1521.562637][T16685] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1521.568022][T16685] ? aa_file_perm+0x5be/0x14d0 [ 1521.572800][T16685] ? __lock_acquire+0xc6c/0x4a70 [ 1521.577750][T16685] alloc_pipe_info+0x10a/0x4f0 [ 1521.582527][T16685] splice_direct_to_actor+0x777/0x980 [ 1521.587950][T16685] ? debug_smp_processor_id+0x2f/0x185 [ 1521.593418][T16685] ? do_splice_from+0x110/0x110 [ 1521.598294][T16685] ? do_splice_to+0x170/0x170 [ 1521.602996][T16685] do_splice_direct+0x1b4/0x280 [ 1521.607862][T16685] ? splice_direct_to_actor+0x980/0x980 [ 1521.613435][T16685] do_sendfile+0x555/0xc50 [ 1521.617883][T16685] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1521.623184][T16685] ? wait_for_completion+0x270/0x270 [ 1521.628480][T16685] ? __sb_end_write+0x101/0x1d0 [ 1521.633349][T16685] ? vfs_write+0x161/0x5d0 [ 1521.638128][T16685] __x64_sys_sendfile64+0x1cc/0x210 [ 1521.643335][T16685] ? __ia32_sys_sendfile+0x220/0x220 [ 1521.648630][T16685] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1521.654790][T16685] ? do_syscall_64+0x21/0x7d0 [ 1521.659478][T16685] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1521.665474][T16685] do_syscall_64+0xf6/0x7d0 [ 1521.669996][T16685] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1521.675988][T16685] RIP: 0033:0x45ca69 [ 1521.679896][T16685] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.699518][T16685] RSP: 002b:00007f0ca0e80c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1521.708115][T16685] RAX: ffffffffffffffda RBX: 00000000004fcdc0 RCX: 000000000045ca69 [ 1521.716099][T16685] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1521.724082][T16685] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1521.732063][T16685] R10: 0000000100002a00 R11: 0000000000000246 R12: 0000000000000006 [ 1521.740143][T16685] R13: 00000000000008f3 R14: 00000000004cbc3f R15: 00007f0ca0e816d4 15:56:04 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000040000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1522.460454][T16657] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1522.471097][T16661] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1522.535101][T16661] device ipvlan869 entered promiscuous mode [ 1522.572620][T16682] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1522.618404][T16682] device ipvlan870 entered promiscuous mode 15:56:04 executing program 4 (fault-call:6 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:56:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x12}, 0x0) 15:56:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c50535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x800000000000000}, 0x0) 15:56:04 executing program 0: unshare(0x40000000) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x12060) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000100), 0x492492492492711, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000004c0)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800e5800e880000100005070000000000000000", @ANYRESOCT=r1, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) r5 = socket(0x1000000010, 0x80003, 0x0) sendmmsg$alg(r5, &(0x7f0000000100), 0x492492492492711, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000014000ffc126e77ac2ed2546e8f2101000000000700000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) [ 1522.858567][T16707] IPVS: ftp: loaded support on port[0] = 21 15:56:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x13}, 0x0) 15:56:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x900000000000000}, 0x0) 15:56:05 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000050000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1522.936690][T16716] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1522.949010][ T29] audit: type=1804 audit(1591890965.205:784): pid=16708 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1019/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1522.951334][T16708] FAULT_INJECTION: forcing a failure. [ 1522.951334][T16708] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.020571][T16716] device ipvlan871 entered promiscuous mode [ 1523.041178][T16707] virt_wifi0 speed is unknown, defaulting to 1000 [ 1523.046121][T16716] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1523.055997][T16708] CPU: 0 PID: 16708 Comm: syz-executor.4 Not tainted 5.7.0-syzkaller #0 [ 1523.064505][T16708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.074566][T16708] Call Trace: [ 1523.077868][T16708] dump_stack+0x188/0x20d [ 1523.082233][T16708] should_fail.cold+0x5/0xa [ 1523.086757][T16708] ? lock_downgrade+0x840/0x840 [ 1523.091622][T16708] ? fault_create_debugfs_attr+0x140/0x140 [ 1523.097452][T16708] should_failslab+0x5/0xf [ 1523.101882][T16708] __kmalloc+0x2d9/0x7a0 [ 1523.106135][T16708] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1523.111684][T16708] ? alloc_pipe_info+0x1e0/0x4f0 [ 1523.116629][T16708] ? aa_file_perm+0x5be/0x14d0 [ 1523.121403][T16708] ? __lock_acquire+0xc6c/0x4a70 [ 1523.126351][T16708] alloc_pipe_info+0x1e0/0x4f0 [ 1523.131128][T16708] splice_direct_to_actor+0x777/0x980 [ 1523.136517][T16708] ? debug_smp_processor_id+0x2f/0x185 [ 1523.142006][T16708] ? do_splice_from+0x110/0x110 [ 1523.146878][T16708] ? do_splice_to+0x170/0x170 [ 1523.151584][T16708] do_splice_direct+0x1b4/0x280 [ 1523.156449][T16708] ? splice_direct_to_actor+0x980/0x980 [ 1523.162043][T16708] do_sendfile+0x555/0xc50 [ 1523.166575][T16708] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1523.171877][T16708] ? wait_for_completion+0x270/0x270 [ 1523.177172][T16708] ? __sb_end_write+0x101/0x1d0 [ 1523.182042][T16708] ? vfs_write+0x161/0x5d0 [ 1523.186506][T16708] __x64_sys_sendfile64+0x1cc/0x210 [ 1523.191750][T16708] ? __ia32_sys_sendfile+0x220/0x220 [ 1523.197073][T16708] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1523.203072][T16708] ? do_syscall_64+0x21/0x7d0 [ 1523.207763][T16708] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1523.213758][T16708] do_syscall_64+0xf6/0x7d0 [ 1523.218301][T16708] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1523.224195][T16708] RIP: 0033:0x45ca69 [ 1523.228096][T16708] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.247708][T16708] RSP: 002b:00007f0ca0e80c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1523.256132][T16708] RAX: ffffffffffffffda RBX: 00000000004fcdc0 RCX: 000000000045ca69 15:56:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x60}, 0x0) [ 1523.264165][T16708] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1523.272172][T16708] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1523.280160][T16708] R10: 0000000100002a00 R11: 0000000000000246 R12: 0000000000000006 [ 1523.288146][T16708] R13: 00000000000008f3 R14: 00000000004cbc3f R15: 00007f0ca0e816d4 15:56:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xa00000000000000}, 0x0) 15:56:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0}, 0x0) [ 1523.494961][T16716] device ipvlan872 entered promiscuous mode 15:56:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c60535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1523.609419][T16711] IPVS: ftp: loaded support on port[0] = 21 15:56:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:56:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb00000000000000}, 0x0) 15:56:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x204}, 0x0) 15:56:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2d1}, 0x0) [ 1524.339058][ T29] audit: type=1804 audit(1591890966.595:785): pid=16763 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1020/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1526.563430][T16746] __nla_validate_parse: 8 callbacks suppressed [ 1526.563441][T16746] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1526.591319][T16746] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1526.672459][T16749] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1526.699097][T16749] device ipvlan873 entered promiscuous mode [ 1526.720290][T16768] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1526.738732][T16768] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1526.793836][T16769] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1526.876353][T16769] device ipvlan874 entered promiscuous mode [ 1529.584301][ T373] tipc: TX() has been purged, node left! 15:56:15 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000060000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x300}, 0x0) 15:56:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xc00000000000000}, 0x0) 15:56:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r4) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000200)="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") sendfile(r3, r0, 0x0, 0x3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r2, 0x0, 0x100002a00) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) accept$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, &(0x7f0000001200)=0x1c) [ 1533.116486][T16806] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1533.132704][T16806] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c70535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x402}, 0x0) 15:56:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:56:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x500}, 0x0) 15:56:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x600}, 0x0) 15:56:15 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000005c00128009000100766c616e000000004c000280060001008809000034000c000100ef000000040000005cb65f90bc0100b8381655060000000c00010007000000000100000c00010000000000050000000c000200100000000100000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x8c}, 0x1, 0x0, 0x0, 0x54}, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) r4 = accept4$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x80000) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000280)=0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000340)=0x40, 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000006ec0)=@newtfilter={0x8bb4, 0x2c, 0x800, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x1, 0x6}, {0x2, 0xd}, {0x3, 0x7}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x8b84, 0x2, [@TCA_BASIC_EMATCHES={0x1504, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xf45d}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_LIST={0x128c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4, 0x7, 0x7}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x4, 0x7, 0x8000}, {{0x2, 0x1, 0x0, 0x1}, {0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x2, 0x1, 0x100}, {0x6, 0xfff, 0x9, 0x5, 0x4, 0x1, 0x2}}}, @TCF_EM_IPT={0x1220, 0x2, 0x0, 0x0, {{0x6, 0x9, 0x40}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_DATA={0xb0, 0x5, "048f0d2afe4abeed39cc46113f73dc359c7e6cbd64a354d2551c0065f817a2ef43f49f61bd177d8e52c8e8dd1bd6cfd09a63dded93d460fe40f13424a2f6234b8bff7d54aa853d499739364c96001765d27409d3c42a8e10ddf2ac1b3e6f575d8b292d2f8693d9ed8bf84d7e2e94749055a21a05b8be5c182c4a48acdfe2fda6974319e641b91b418bf7536d0f849f4baac47f026894ff35f5010c76775860863efc8398e91d4fe8fbc85737"}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_DATA={0xa8, 0x5, "1a6b6a37e4b96ac56df4567d632fb014f8ac75d05ba945d07ca2b87014742758a85e3fb1e1e8339d919147fc5811396d169383ebae8b81a468e801d7dd9e8bb5066feda8edb9e6f9f4870724ab6fe984b78d8e76d7720fee1876866e66411ffc1a4dbb1620ffcad4e044c1b1c52e41d88bae2edff42ed7f8ed5a623402e9b4b2a8dac96e0f07693f99a0796552cdee24aea6424c3dcddbee5725ddf8f5036bdf5006d53a"}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_DATA={0x1004, 0x5, "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"}, @TCA_EM_IPT_MATCH_DATA={0x8c, 0x5, "cea582139b46ed1869a0e6e75f0a1e30a6bfa009fed9a90f90569b597b8e9a17ea3bce4353ea5c6a2c9e780cd9bbb0b9e3414b26a1f435ed663ff610ad7ed45b4ee9d3636895e92eb7182d014bb28e4459c23c8b3d85de29db4805f82b3022ca827ea47f303f729b330fa2b519a9d5f94c32c236f6a14ab0f4c9bde8a9ce742d53407c681ed91e93"}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}, @TCF_EM_CONTAINER={0xc, 0x3, 0x0, 0x0, {{0x800, 0x0, 0x200}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0xe848, 0x3, 0x9}, {0x80, 0x4, 0x5, 0x9}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_LIST={0x25c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x5c, 0x1, 0x0, 0x0, {{0x564, 0x4, 0x80}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0xa2}, {0xf362}}}, @TCA_EM_META_LVALUE={0x1e, 0x2, [@TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="eb694913c17e", @TCF_META_TYPE_INT, @TCF_META_TYPE_VAR="179b68415e1d0801", @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_RVALUE={0x17, 0x3, [@TCF_META_TYPE_VAR="6bd4", @TCF_META_TYPE_VAR="9d005b59", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="81"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x8001, 0x9, 0x1}, {0x800, 0xb3, 0x2}}}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x2, 0x7, 0x3}, {{0x3, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}}}, @TCF_EM_META={0xa0, 0x3, 0x0, 0x0, {{0x3ff, 0x4, 0x8}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="079f7ef55799a3753f95", @TCF_META_TYPE_VAR="0e7f", @TCF_META_TYPE_VAR="ae", @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x0, 0x2}, {0x3, 0x6, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x9b7, 0x7, 0x1}, {0x804, 0x0, 0x2}}}, @TCA_EM_META_RVALUE={0x18, 0x3, [@TCF_META_TYPE_VAR="c849", @TCF_META_TYPE_VAR="79564db7", @TCF_META_TYPE_VAR="cf", @TCF_META_TYPE_VAR="3203bd5170", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT]}, @TCA_EM_META_LVALUE={0x23, 0x2, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_VAR="a01c11925142f77c64", @TCF_META_TYPE_VAR="5b1508", @TCF_META_TYPE_VAR="72ed48a2b5e269", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_VAR="e77dae4fecbc8fdd"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xc3, 0x2, 0x2}, {0x7, 0x3f, 0x2}}}]}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x7, 0x8, 0x3ff}, {0x2, 0x1, 0x4}}}, @TCF_EM_CONTAINER={0x88, 0x2, 0x0, 0x0, {{0x8, 0x0, 0x1}, "441d7011659742105ac7a26889c76fb60cd5e065e4771ca7c5e86be10f06203b05d322468a52d20d268945632b62d19af1f78566e28e5c021f314e396ae8f67759d8a34c0f376a5cd76d79778720571582897c5d7f41113f3ab913015adf623c73bc968fb4b73f55acb9b1b4040aac6af62c5c5194fac9b5a2bbb462"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x1e, 0x3, 0x8001}, {0x4, 0x3, 0x6f75, 0x2}}}, @TCF_EM_META={0x14, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x9}, [@TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x9]}]}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x7, 0x8, 0x800}, {0x4, 0x1, 0x1}}}, @TCF_EM_CONTAINER={0x60, 0x3, 0x0, 0x0, {{0xffc1, 0x0, 0xdc8}, "ccdcfc8a581a34e0525baebbec9f99543e42d8d75eb47bb0d8b3a8bad68f1992e9bb58c50ba8efb8ae6fa7d4a05054bb0df5032727a6fefbe349410abe800245df2cb1fce1b59ac01188e41fd7a6c8b42c35c3c9"}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x2, 0x8, 0x1f}, {0x4, 0x4, 0x3}}}]}]}, @TCA_BASIC_POLICE={0x45c, 0x4, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3f, 0x1, 0xc1f, 0x9, 0x9, 0x101, 0x100, 0x100, 0x1, 0x7, 0x830, 0x2, 0x7fff, 0xfffffffc, 0x0, 0x5, 0x2, 0x5, 0x7, 0x7, 0x2, 0x0, 0x828c, 0xc1f5, 0x6, 0x7f, 0x3, 0x9, 0x3f, 0x5, 0xc7b, 0x401, 0x403, 0x4, 0xffffffc1, 0x10001, 0xf4, 0xb54f, 0x29, 0x8, 0x7ff, 0x126b, 0x7ff, 0x8f, 0x8000, 0x4, 0xfffffffe, 0x0, 0x8, 0x401, 0x60, 0x8, 0x549, 0x81, 0x401, 0x5, 0x6, 0x4, 0x0, 0xffffffc0, 0x3ff, 0x7, 0x5, 0x7, 0x1, 0x0, 0x8001, 0x3, 0x6, 0x8, 0x10001, 0x0, 0x2, 0x6, 0xffffff80, 0x5, 0x4, 0x80, 0x4, 0xfffff800, 0x7b874150, 0x2, 0x6, 0x80000, 0x2, 0x1, 0x7fff, 0x0, 0x7fff, 0x7, 0x8001, 0x3f, 0x0, 0xe239, 0x80, 0x1, 0x1, 0x6, 0x3, 0x1, 0x80000001, 0x2, 0x1a7, 0x3, 0x5, 0x3, 0x4, 0x7, 0x0, 0x2, 0x79d, 0x7, 0x1, 0x7, 0x7fffffff, 0x7, 0x1, 0x4, 0xffff0000, 0x3, 0x725, 0x0, 0x1, 0x80000000, 0x7, 0x4, 0xfffffffd, 0xaf, 0x40, 0x2, 0x8, 0x8, 0x3, 0x40, 0x1000, 0xfffff000, 0x4, 0xffff, 0x5, 0x7, 0x0, 0x81, 0x3, 0x0, 0x20, 0x9, 0x2, 0xca0, 0x7, 0x8, 0x70e, 0x10000, 0xffff7fff, 0xb59a, 0x80, 0x6, 0x8, 0xffffffff, 0x101, 0x9, 0x7ff, 0xfffffffc, 0x5, 0xfff, 0xff, 0x7f, 0x2, 0x1, 0x8001, 0xff, 0x80, 0x8, 0x6, 0x80, 0xfffff800, 0x7ff, 0x2, 0xbf6, 0xe4, 0x4, 0x1, 0x21ea, 0x0, 0x7, 0x6, 0x4, 0x7f, 0x7, 0x1, 0x80000000, 0x1, 0x2, 0x4, 0xfff, 0xfffffff7, 0x4, 0xff, 0xebf, 0x3, 0xdd, 0x7, 0x1, 0x0, 0x6, 0x2000, 0x8, 0x2, 0x2, 0x80000001, 0x7, 0x8, 0xf717, 0x1, 0x7, 0x783, 0x1f1a, 0x2, 0x200, 0x0, 0x3, 0x1, 0x0, 0x3f, 0x99b, 0x7fffffff, 0x4, 0x1, 0x6, 0xdc42, 0x1, 0x200, 0x1, 0x4, 0x4, 0xf6, 0x5, 0x7, 0x7, 0x8, 0x5, 0x0, 0x9, 0xc6, 0x3, 0x5, 0x6, 0x5, 0x4, 0x5, 0x200, 0x1, 0xa48, 0x6, 0xfffffffb, 0x8, 0xfffffff8]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffffff, 0xffffffffeffffffe, 0x0, 0x6, 0x94e5, {0x1, 0x1, 0x1f, 0x2, 0x4, 0x6}, {0x4, 0x2, 0x4, 0xfffc, 0xfffb, 0x2c76}, 0x10000, 0x81, 0x5}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_RATE64={0xc, 0x8, 0x9}]}, @TCA_BASIC_POLICE={0x410, 0x4, [@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x0, 0xffffffe1, 0xad6, 0x3, 0x7, 0x3, 0x4, 0x5000000, 0x7, 0x2, 0x7ac0, 0x7f, 0x9a, 0x6, 0x8001, 0xffffffff, 0x1, 0x6b766dd, 0x2, 0x2, 0x4, 0x1000, 0x7, 0x0, 0x9, 0x2, 0x5, 0xffff, 0x4, 0x6, 0x0, 0x35a, 0x5, 0x1, 0x7, 0x2, 0x2, 0x1, 0x9, 0x7, 0x2, 0x1, 0x6, 0x0, 0x9, 0x50, 0x400, 0x7717, 0xfffff8bb, 0x3, 0x7, 0x9, 0x0, 0x2, 0x2, 0x3ff, 0x2, 0x7ff, 0x8080, 0x8, 0xffffffff, 0x1000, 0x6, 0x200, 0x0, 0x100, 0x2, 0xffffffff, 0x1, 0x401, 0x0, 0x80000001, 0x0, 0x1, 0x200, 0x6, 0x1, 0x400, 0x100, 0x8261, 0x473b, 0x8, 0x1, 0x6, 0x47a, 0x3, 0xffff, 0x0, 0x7f, 0x80000001, 0x101, 0x4, 0x4, 0x2, 0x8, 0x10001, 0x4, 0x4, 0xfff, 0x2fa1, 0xd4de, 0x3, 0x9, 0x101, 0x7ff, 0x7f, 0x1, 0x6, 0x1, 0x8, 0x2, 0x8, 0x7, 0x6, 0x8, 0xff, 0xfff, 0x3, 0x7, 0x8, 0x3ff, 0xfffffff7, 0x7fff, 0x3, 0x400, 0x3, 0x0, 0x5, 0x0, 0x1e6, 0x5, 0xb034, 0x2, 0x8000, 0x2, 0x2, 0x6, 0x4, 0x6, 0x12000, 0x1, 0x800, 0x1, 0x6, 0xffffffff, 0x9000, 0x4, 0x1ff, 0x5, 0x9, 0x1, 0x6b, 0x0, 0x7fff, 0x2, 0x3, 0x401, 0x3f, 0xffffff4d, 0x4, 0x7fffffff, 0xffff, 0x29, 0x4e, 0x200, 0x7ff, 0x0, 0x2fc2, 0x80000000, 0x1, 0x4, 0xef, 0x8b8, 0x10000, 0xf8d, 0x4, 0xfffffffe, 0x7, 0x9, 0xb63, 0xff, 0xd9bf, 0x8001, 0x1d0, 0x28fd, 0x0, 0x0, 0x3, 0x3ff, 0xd6ff, 0x3c, 0x3f, 0x401, 0x3, 0x83, 0xb, 0x4d, 0x6, 0x5, 0x8, 0x2, 0xa2, 0x4, 0x20000000, 0x5, 0x2, 0x8, 0x200, 0x800, 0x2, 0x5, 0x57d, 0xabb7, 0x4, 0x8, 0xff800000, 0x1, 0x3, 0x8, 0x4, 0x3, 0x9, 0x1, 0x832, 0x0, 0xf1, 0x8, 0x3, 0xd8d, 0x3f, 0x5, 0x3, 0x4, 0x7dc2, 0x8, 0x3, 0xc8, 0x15c0, 0x2, 0x3, 0x9, 0x0, 0x80000001, 0x34, 0x200, 0x9, 0x3, 0x1, 0x0, 0x1, 0x101, 0xfffffff9, 0x8, 0x1, 0xcfc]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x40}]}, @TCA_BASIC_ACT={0x650, 0x3, [@m_connmark={0x144, 0x13, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0x81, 0x2, 0x81, 0x7}, 0xfff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x5e8, 0x3, 0x6, 0x9}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1ebf979c, 0x1, 0x3, 0x44, 0x3}, 0x8}}]}, {0xbe, 0x6, "595d4ccb13de24905dd10669bfcfa19cbcd689a5a2f7a90a8e7a390c2b61a2f2a52433d87b9c3940af6778e3742ae7c4fd32a94b00318d1f0f38dee78a58cb117105bddc45fac4779731e1999f4828f51ef518ef6e1584da7a34d850c3548c281cf9f92b4dedac26cb0d97d2088b281785a4fd31c2865ca96d507e47ffcada0ba3460556447f7bb79c1e1f821bb3a3c9f9828472613c34871ba62b916029629a8be6b959f44cf241ef7f5158d88e2a09e5ac2fa5b315e2e96467"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ct={0xa0, 0xb, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e21}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @local}, @TCA_CT_MARK={0x8, 0x5, 0x8}, @TCA_CT_ACTION={0x6, 0x3, 0x1}]}, {0x4a, 0x6, "19b660323f5f54d576a78e8dcff23a4afa2e1d1a8fd955f77772aa94e40863b3fa72998acdb9ccdf8ddfae3bcbea5229d53d5df84a4565c85def7de5dae2463bbf7abb87b45e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_vlan={0xa0, 0x5, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x5, 0x2, 0x7}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xfffff001, 0x9, 0x7, 0xd96, 0x6}, 0x1}}]}, {0x1b, 0x6, "7e8dfc44f6d10df195ac571c1767da8f93e45a970fb58d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_xt={0x134, 0x20, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0xa0, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0x3c, 0x6, {0xff, 'security\x00', 0x5, 0x3cb7, "ee7f172d100e8bedc80a6a326b9f5cb3cb2d"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}]}, {0x6e, 0x6, "d35f212510edaf80ced174d3e3158a95cee0702ba3eff2ada97219643761ec63a340cd3aa443d9bd67d3d9752c8b22aaf8c9d336fe206a34acb257cad1ad8f6ff8aa1d97f1439a3629cd35b8fdf5c179c42fcb306a772ae4213a846af4fe20cf557913c7b1bbcb660611"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_sample={0xf4, 0x12, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x9}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x7}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x6000000}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x4}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x9}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xffffffff}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1ba}]}, {0x86, 0x6, "0786fd975dee72951e9ace4d56fabdfd3dfe5d1e34d81d566abee5e0e82af58aacb0957957eb1436a692dadcacc44c2c8bb17666242ebbe8cf41c34e18049704b8fd529dd2a6ce9fcb6e3c434cf17c7944d5894168fc6f0e51a3afbfe44a422f977e7a60c41d8bd7a2b0a5866cf7dd945a385cbe1b75cba7bea2e50ffc4c13052b7d"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_gact={0xd0, 0x5, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x57, 0x9, 0x4, 0x0, 0xff}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x153c, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7fffffff, 0x5, 0x10000000, 0x6, 0x6000000}}]}, {0x66, 0x6, "c6cae4a221460d27e0669796c044aef6c3fcdc27209bee6f24112afd65f55ea6006271d20cf6ddcd5398d982cd0688f44c413e0625e3a1bf7cfb681e8679e13042654614a58fa6c65c0705116efc7f3a69467e4eeef8b4ce97746b3d58b6d3948f6f"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_connmark={0xd0, 0x5, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4d794a00, 0x800, 0x0, 0x6e64}, 0x6}}]}, {0x82, 0x6, "e256f2184adf956dc1362d4c9092d6f39830bb61520699d5709d67972dff3b9989d0bbe87d101ebc96c9efe80789f33e0f4ac7d12f33e11ccb5831be939568f2a3a9dc53cfccee26d1c58416b78b8f9e449412e0c5609888685d7033ecb6fab434e5bf78cb4f6d12b62c1502efefc521d3ca9809c217fa52c000b7f751d6"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xfff3, 0x3}}, @TCA_BASIC_ACT={0x657c, 0x3, [@m_mpls={0x1058, 0x1a, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5}, @TCA_MPLS_TC={0x5, 0x6, 0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_TC={0x5, 0x6, 0x5}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x5, 0x2}}}}, @m_simple={0xa8, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x7, 0x3, ')&\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x3, 0x7, 0x10000000, 0x5, 0x5}}, @TCA_DEF_DATA={0x9, 0x3, 'vlan\x00'}, @TCA_DEF_DATA={0xc, 0x3, 'batadv0\x00'}, @TCA_DEF_DATA={0xc, 0x3, '%*-\b,#.\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x30, 0x6, "1b134cb27ed73dcf35699f3e170494ea9087d8c0a8c69ddba40bafb3d8bba95a8b8cf7d72e001b9611d59871"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x6}}}}, @m_pedit={0x2c9c, 0x18, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x2c34, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe98, 0x4, {{{0x18000000, 0x5, 0xffffffffcffffff6, 0x81, 0x1}, 0x1, 0x7, [{0x6b78, 0x2, 0xc0000000, 0x6, 0x9d, 0x6e08}, {0x7, 0xfffffeff, 0x1000, 0x9, 0x4, 0xcad}, {0x6, 0xf5d, 0x8, 0x5, 0x7, 0x8}, {0x2, 0x80, 0x99, 0x8, 0x5, 0x4}, {0xab5, 0x0, 0x8, 0x40, 0x7fff, 0x37f}]}, [{0x0, 0xfff, 0x1000, 0x20, 0x200, 0x1}, {0x28000, 0x6, 0x5, 0x20, 0x9, 0x81}, {0x1, 0xd6d, 0xa42e, 0x81e, 0x5, 0x1}, {0x400, 0x8, 0x7, 0xfffffffd, 0xfffffffd, 0x4}, {0xfffffffb, 0x7, 0x1000, 0xfff, 0x4}, {0x2, 0x80200, 0x100, 0xffff0000, 0x18, 0xff}, {0x80000000, 0x80000000, 0x200, 0xff, 0xff}, {0x0, 0x3ff, 0x4, 0x9, 0xfffffffc, 0x7fffffff}, {0x6, 0x1, 0x8f58, 0x7ff, 0x8001, 0x4}, {0x7, 0x2, 0xfffffffa, 0x3, 0x5, 0x800}, {0x7fff, 0xfffffff9, 0x8, 0x3f, 0x7, 0x3}, {0x7, 0x8000, 0xfff, 0x96ac1b9, 0xd0, 0x7}, {0x7, 0x3, 0x3, 0x10000, 0x7fff, 0x2}, {0x4, 0x9, 0xffff, 0x81, 0xbba, 0x7fffffff}, {0x1, 0x0, 0x5, 0x5, 0x81, 0x9}, {0x3, 0x2d, 0x5, 0x6, 0x6965, 0x6}, {0x4, 0x1, 0x8, 0x8, 0x6, 0xffff7fff}, {0x6, 0xffff, 0x1d0a, 0x4071, 0x8001}, {0x6, 0x80000001, 0x2a5, 0x1000, 0x4, 0xffffffff}, {0x9, 0xb21, 0x5, 0x9, 0x0, 0x385}, {0xffffffff, 0xfffffffd, 0x7, 0x7, 0x3, 0x5}, {0x1ff, 0x6, 0x3, 0x7, 0x30, 0x9}, {0x1, 0xd44, 0x27, 0x3, 0x9, 0x1}, {0x52c4, 0xff, 0x4, 0x7, 0x200, 0x701}, {0x3, 0x1f, 0x7, 0x1, 0x6, 0x2561}, {0x0, 0x6cc, 0x8001, 0x2, 0x7, 0x2}, {0x400, 0x0, 0x401, 0x5, 0x8001, 0x1}, {0x2, 0x0, 0x1000, 0x10000, 0x4, 0x200}, {0x1ff, 0x81, 0x667, 0x939, 0x3, 0x9}, {0xffff0000, 0x5, 0x40, 0xffffff00, 0x40e, 0x9}, {0x3, 0x0, 0x1ff, 0x49, 0x8, 0xfffffffb}, {0x8, 0x6, 0x9, 0x800, 0xffffffff, 0xb3}, {0x3, 0x3f, 0xffffffff, 0x2, 0x0, 0x8}, {0x7, 0x4, 0x9, 0x200, 0x4, 0x5}, {0x1, 0x2, 0x1, 0x2, 0x4, 0x6}, {0x6, 0x100, 0x1, 0x3, 0x8, 0x5}, {0x38da, 0x0, 0x8, 0x3, 0x40, 0x5}, {0x4, 0x2, 0xfffffbc2, 0x80000000, 0xea, 0x7f}, {0x2, 0x426, 0x3, 0x4d, 0x40, 0x4}, {0x0, 0x8, 0xdfbe, 0x60a, 0x5, 0x8}, {0x6f91, 0xfffffffd, 0x1, 0xfffffff8, 0x8, 0x7fffffff}, {0x9, 0x4, 0xeff3, 0xfffffffe, 0x2}, {0x3, 0xa741, 0x3a6f, 0x0, 0x2, 0x7}, {0x3, 0x6, 0x7ff, 0x4, 0x8, 0x1ff}, {0xffffff81, 0x2, 0x164, 0x9, 0x1ff, 0x1ff}, {0x8, 0x5, 0x6, 0x7, 0x4, 0x8}, {0xd4, 0x7, 0x2, 0xfff, 0x2, 0x20}, {0x1, 0x2e06, 0xe6, 0x8a, 0x1, 0x6}, {0x8, 0x6, 0xffffffff, 0x9, 0x7f000, 0x140000}, {0x1ff, 0xff, 0x6, 0x8, 0xff, 0x7fff}, {0x1ff, 0x4, 0x400, 0x8000, 0x82, 0x2}, {0x1ff, 0x200, 0x5, 0x0, 0x6, 0x5}, {0x6, 0x0, 0x100, 0x0, 0x5, 0x9279}, {0x8, 0x8, 0xfffffff9, 0x400, 0x4, 0xe60}, {0x2, 0x1, 0x3, 0x5, 0x10, 0x4}, {0x0, 0x20, 0x10001, 0x3d, 0x8, 0x2}, {0x6, 0x9, 0xffff, 0x6, 0x5, 0x7}, {0x9, 0x5, 0x5, 0xfffffffe, 0xc3}, {0x3e, 0x1f, 0x8, 0x4, 0x82c, 0x9f}, {0x9, 0xe0, 0x2, 0x4, 0xfffff6b2, 0x4}, {0x7, 0xdc6c, 0x8, 0xa3c, 0x2, 0x6}, {0x0, 0x81, 0xa92, 0x0, 0x8, 0x9}, {0x1, 0x0, 0x5, 0x7c57, 0xb22, 0x4}, {0xf1, 0x6, 0x3f, 0x44, 0x400}, {0xf36, 0x7, 0x2, 0x100, 0x4, 0x1}, {0x401, 0x8, 0x800, 0x1, 0x3, 0x1}, {0xfff, 0x101, 0x0, 0x4, 0x4, 0x71}, {0x100, 0x8, 0x7c6c, 0x1, 0x81, 0x2}, {0xffffffff, 0x3, 0x1, 0x7, 0x5, 0x100}, {0x3, 0x3, 0x1, 0xfff, 0x100, 0x8c}, {0xea8, 0x3, 0x40, 0x130, 0x0, 0x400}, {0x8001, 0x1ff, 0x5, 0x8, 0x4, 0x8}, {0x3, 0x3ff, 0x1, 0x4, 0x8, 0x7}, {0x0, 0x3f, 0x7ff, 0x0, 0xfffffffe, 0x9afb}, {0xff, 0x7, 0x4, 0x368000, 0x90f, 0x40}, {0x2, 0x8, 0x5, 0x5, 0x4, 0x3}, {0x100, 0x8, 0x81, 0x4, 0xfff, 0x4}, {0x50000000, 0xffffffff, 0x1ff, 0x8, 0xa9dd, 0x2}, {0x8, 0x1, 0x5000000, 0x7f, 0x2, 0x80000001}, {0x4, 0xfffffff8, 0x8, 0x401, 0x68c2, 0xdb}, {0x200, 0x5, 0x6, 0x2, 0x1, 0x7}, {0x7, 0x800, 0x0, 0x1f, 0x8, 0x3}, {0x1bef7284, 0x5, 0xffffffc0, 0x1, 0x8, 0x3}, {0x9, 0x5, 0x0, 0x4, 0x5, 0x1}, {0x40, 0x1f, 0x1, 0x1000, 0x429c48f6, 0x1000}, {0xee, 0x8, 0x8001, 0x80000000, 0x8, 0x5}, {0x0, 0x20, 0x400, 0xb4c, 0x40, 0x9}, {0x7fff, 0x6, 0x9d, 0x2, 0x5, 0x6}, {0x3, 0x7, 0x3, 0x7, 0x7, 0x4}, {0x7, 0x3d, 0x1000, 0x4, 0x4, 0xffff8000}, {0x80000001, 0x9, 0x3ff, 0x4, 0xffffffc1}, {0x931, 0x3ff, 0x8, 0xeb, 0x0, 0xd}, {0x5445, 0x99be, 0x9f0b, 0x5, 0x963, 0xed09}, {0x49, 0x5d4e, 0x8, 0xc7, 0x8, 0x1ff}, {0x401, 0x800, 0x555, 0x9, 0x1f, 0x42}, {0x8, 0xffffffff, 0x4, 0xdf6c708b, 0x400, 0x8}, {0x2e800, 0x7, 0x5, 0x10000, 0x9, 0x5}, {0x5, 0x101, 0xffffffff, 0xa205, 0x200000, 0x40}, {0x2fff, 0xe33, 0x10000, 0x5d, 0x2, 0x5}, {0x4, 0x9000000, 0x200, 0x2, 0x6, 0x5}, {0x4, 0x5, 0x4, 0x8001, 0x1fa4, 0x1000}, {0xfffffffb, 0x7fff, 0x10000000, 0x4, 0x3, 0x6}, {0xb00, 0x9, 0x1, 0x8, 0x8, 0xb89}, {0x800, 0x400, 0xfffffffd, 0x2, 0x1, 0x8}, {0x1, 0x800, 0x3f, 0x7f, 0x98, 0x5}, {0x10000, 0x4, 0x2, 0xd240, 0x5, 0xfffffffe}, {0xb3d0, 0x40, 0x4a82, 0x6bf, 0x0, 0x8}, {0xfffffbff, 0x7, 0x8, 0x1f, 0x9, 0x11}, {0x3, 0x9, 0x1, 0x35, 0x20, 0xaf}, {0x3, 0x1000, 0x3, 0x5, 0xc1, 0x3}, {0x6, 0x9, 0xfffffffb, 0x80e, 0x1, 0x8}, {0x0, 0xfb, 0x101, 0xfffffffb, 0x6b, 0x2}, {0x8000, 0x7, 0x446b, 0x4, 0x1, 0x1}, {0x9, 0x9bd2, 0x1000, 0x1, 0x2, 0x266}, {0xcf5, 0x5, 0x1a887678, 0x1, 0x4, 0xffffffe1}, {0x8, 0x7, 0x4, 0xd8a, 0x2, 0xdd}, {0x8, 0x5f68, 0xa0, 0xee7, 0xffffffff, 0x5}, {0x9, 0x2, 0xfffffffc, 0xf409, 0x10001, 0x7}, {0x7, 0x0, 0x9, 0x0, 0x5}, {0xffff, 0xfffffff7, 0xf7e, 0xed, 0x2, 0x7}, {0x3, 0x0, 0x8, 0xdfa, 0xffffff01, 0x80000001}, {0x9, 0x8, 0x7ff, 0x5, 0x6, 0x3f}, {0x3, 0x8, 0x4, 0x5, 0x46d6, 0xfffffff7}, {0x40, 0x7ff, 0x5, 0xffff8fb3, 0x2, 0x9}, {0x6, 0x2, 0x3, 0xb913, 0x2, 0x6}, {0xf4, 0xff000000, 0xaaf9d96, 0x9, 0x3, 0x5}, {0x3, 0x400, 0xfffffffb, 0xfffffff7, 0xeb, 0x80000001}, {0x7, 0x9, 0x0, 0x1, 0x2, 0x6}], [{0x3, 0x1}, {}, {0x4}, {0x2}, {0x4, 0x1}, {}, {}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x1}, {0x1, 0x1}, {0x2}, {0x3}, {0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x1}, {}, {0x5, 0xa36dccc0134ffc72}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x2}, {0x3}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x4}, {}, {0x1}, {0x3}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0xaa748251c79f27ec}, {0x5, 0x2}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x2}, {0x3, 0x1}, {0x1, 0x2}, {0x4, 0x1}, {0x0, 0xc097758088940cbb}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x5}, {0x5}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {}, {0x4}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x5}, {0x2}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x2}, {0x4, 0x1}, {0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x1}, {0x4}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x2}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe80, 0x4, {{{0x7, 0x7f, 0x5, 0x853, 0x8}, 0x3f, 0x1, [{0x101, 0x2, 0xffff, 0x7a3c, 0xfffffffc, 0xcca}, {0x40, 0x1, 0x0, 0x7ff, 0x7}, {0x8, 0x3ef, 0x5, 0x8, 0xffff, 0x8}, {0x5, 0x0, 0x0, 0xb, 0x1f, 0x1}]}, [{0x9, 0x80000000, 0x162, 0xb1ce, 0x7}, {0xfffffffd, 0x9, 0x5, 0x5, 0x4, 0x6}, {0x6, 0x4, 0xb, 0x9, 0xe55, 0xff}, {0x5, 0x5, 0x59, 0x2, 0x80000000, 0x7}, {0x5, 0x3, 0x3, 0x8, 0x80000001, 0x5}, {0x6, 0x0, 0x0, 0x3f, 0x80000001, 0xffffffff}, {0x0, 0x5, 0x2, 0x7, 0x6, 0x2}, {0x81, 0x5, 0x6, 0xd0c, 0x9, 0x1000}, {0x4, 0x9, 0x8, 0x7, 0x18}, {0xffffffff, 0x101, 0x1ff, 0x5, 0x8, 0x2}, {0x81, 0xffff6887, 0x1, 0x2, 0x75, 0x40}, {0x1000, 0x0, 0x8, 0x1, 0x8d09, 0x53}, {0x2, 0x8001, 0x8, 0x0, 0x3ff}, {0x7, 0x7f, 0x5, 0x6, 0x3, 0x6}, {0x5, 0x2, 0x5, 0xffff, 0x400, 0xcb}, {0x10000, 0x7f, 0xff, 0x1, 0x7f, 0xfff}, {0x3f, 0x4, 0x9, 0x7, 0x3, 0x6}, {0x1f, 0xae, 0x6d2f, 0x7, 0x6, 0x5}, {0x7fffffff, 0x1, 0xfff, 0x401, 0x3, 0x400}, {0x0, 0x4d19289a, 0x8, 0x7fffffff, 0x0, 0x7f}, {0x20, 0x89c2, 0x8, 0x3, 0x8, 0x9a9a}, {0x1fd, 0xffffffff, 0xfffffffc, 0x6, 0x7, 0x10001}, {0x2, 0x101, 0x80000000, 0x3, 0x6, 0x1}, {0xfffffffc, 0x10001, 0x7, 0x7, 0x1}, {0x100, 0x8000, 0x0, 0x84, 0x20, 0x8}, {0x123, 0x9, 0x7, 0x2, 0x38a68a81, 0xfdf}, {0x9, 0x8, 0x1, 0x3, 0x5, 0x81}, {0x7, 0x7ff, 0x8, 0x8, 0x9, 0x4a}, {0x7, 0x7, 0x2, 0x0, 0x2f78, 0x3691}, {0x400, 0x2, 0x83f, 0x9, 0x8001, 0xfff}, {0xfffff000, 0x601e, 0xffff, 0x4, 0x592d, 0x41}, {0x6, 0x6, 0xffffffff, 0x1ff}, {0x3, 0x1000, 0x22, 0x0, 0x0, 0x3}, {0x7, 0x1, 0x2, 0x2, 0x7, 0x5}, {0xff, 0x400, 0x101, 0x40000000, 0x8}, {0x3, 0x9, 0x9, 0x7, 0x7, 0x853f}, {0xdc20, 0xffffff6a, 0x7, 0xc6, 0x9, 0x4121}, {0x6, 0x3, 0x3ff, 0x7f, 0x0, 0x2}, {0x101, 0x22a08efe, 0x578c7dac, 0x200, 0x3ff, 0x146}, {0x2, 0x3, 0x7, 0xffff, 0x8, 0x80000001}, {0xfffff001, 0x40, 0x8001, 0xfffffff8, 0x4, 0xfffffff7}, {0xfffffff8, 0x80000001, 0x0, 0x72e3b4d1, 0x4, 0x7ff}, {0x4, 0x3ff, 0x5, 0x2, 0x3f, 0x5}, {0x3ec4c543, 0xffff, 0x8, 0x7fff, 0x267, 0x8}, {0x3, 0x1fbf, 0xd1df, 0x3ff, 0x2ac, 0x80000001}, {0xf4, 0xffff84e8, 0x200, 0x7, 0x4, 0x4}, {0xa4, 0x80000001, 0x800, 0x48, 0x3579, 0xfffffffd}, {0x1, 0x7, 0x3, 0x3ff, 0x4, 0x6}, {0x2, 0x7fff, 0x0, 0x8000, 0x65, 0x8}, {0x0, 0x1, 0x0, 0x2, 0x0, 0x941}, {0xdee, 0xffe00000, 0x8, 0x8, 0x5, 0x8}, {0x7, 0x1, 0xbc54, 0x6, 0x4d, 0x6}, {0x7, 0x8, 0x0, 0xfff, 0xfe25, 0x9}, {0x5f1a, 0xfffffff7, 0x1, 0x3, 0xffffffa6, 0x5}, {0x8, 0x1907, 0x5, 0x6, 0x7, 0x7}, {0x9, 0x8, 0x1, 0x6f5, 0x7fffffff, 0x8001}, {0x7, 0x4, 0x1, 0xffffffff, 0xf40b, 0x3}, {0x34, 0x2, 0x4, 0x1, 0x40, 0x3}, {0x7f, 0x7ff, 0xab3, 0x4, 0x80000}, {0x401, 0xe755, 0xcc26, 0x7, 0x0, 0xfffffff8}, {0x400, 0x4, 0x9, 0x1, 0x6, 0x10000}, {0x9, 0xe843, 0x1, 0x0, 0x6, 0xffffd53d}, {0x4, 0x81, 0x9, 0x8, 0x1000, 0x5}, {0xfffffff7, 0x81, 0x7, 0x4, 0x10000, 0x7}, {0x540, 0x6, 0x6, 0x0, 0x1, 0x8001}, {0x7, 0x3, 0x9, 0x20, 0x40, 0x2}, {0x6, 0x2, 0x3c7a, 0x7fffffff, 0x7fff, 0x9}, {0x9, 0x7, 0x2, 0xfffffffa, 0x2c2, 0xffff}, {0x100, 0xfffffff9, 0x5, 0x100, 0xfffffffa, 0xf8c2}, {0x0, 0x6, 0xfffff96f, 0xca2, 0x2, 0x5}, {0x0, 0x81, 0x4b, 0x8001, 0x3, 0x4}, {0x5, 0x8a51, 0x4, 0x6, 0x3c, 0xc8}, {0xe00, 0x3f, 0x83, 0x6, 0x2, 0x5}, {0x9, 0x5, 0x7ff, 0x58b2, 0xff, 0x10000}, {0x1, 0x8001, 0x9, 0xfffffffc, 0x3, 0x8}, {0xff, 0xfffffffc, 0x3ff, 0x5, 0x6, 0x5be7}, {0xa9e1, 0x6, 0x8, 0x10001, 0x0, 0x8001}, {0x401, 0x2, 0x8, 0x3, 0x400, 0x1000}, {0x43, 0x8, 0x2, 0x4, 0xffff, 0x401}, {0x8, 0x40, 0x6, 0x8001, 0x10001, 0x1000}, {0x624, 0x5, 0x0, 0xfffffffe, 0x8, 0xfffffe00}, {0x601, 0x4, 0x8000, 0x0, 0x5, 0x2}, {0x3, 0x9, 0x0, 0x4, 0xfffffffc, 0x9}, {0x8, 0x7fff, 0x80000000, 0x3, 0x4, 0x7}, {0x3, 0x10001, 0xa37, 0x1, 0x80000001, 0xecf7}, {0x4, 0x2, 0x4, 0x10, 0x7, 0x4}, {0x7ff, 0xfffffe00, 0x7fffffff, 0x7c0, 0x1, 0x7fffffff}, {0x7, 0x3, 0x3, 0x7fff, 0x35, 0x1000}, {0x6, 0x400, 0x0, 0x8000, 0xff, 0x5}, {0x9, 0x6, 0x5, 0xffff119f, 0x80, 0xfffffffe}, {0x400, 0x0, 0x1, 0x10000, 0x4, 0x400}, {0x0, 0x0, 0x10001, 0x8, 0x4, 0x7}, {0x80000001, 0x9, 0x9, 0x80000001, 0x9, 0x8}, {0x8, 0x887c, 0x8, 0x9, 0x100, 0x6}, {0x400, 0x3, 0x8, 0x280b93b8, 0x1, 0x9}, {0x80000000, 0x5, 0x0, 0x8, 0x8e3f, 0x20}, {0x9, 0x1a, 0x90c, 0x1, 0x2, 0x9}, {0x6, 0x8, 0x7fff, 0x4, 0x1, 0x4}, {0x3, 0x9, 0xfffffffc, 0x5, 0x8000, 0x8}, {0x3ff, 0xa6, 0x10001, 0xda5, 0xe5, 0x7}, {0x3, 0x8, 0x8, 0x5, 0x6, 0x8001}, {0x8, 0x6, 0x10000, 0x1, 0x1, 0x80000000}, {0xffff8000, 0x4, 0x1, 0x20, 0x2, 0x9}, {0x8000, 0xffff, 0x1f, 0x2, 0x2, 0xff}, {0xfffffff8, 0x8000, 0x5, 0x3, 0x71f, 0x5}, {0x7ff, 0x1, 0x0, 0x4, 0xff, 0xb03}, {0x81, 0x0, 0x3, 0xffffffff, 0x3, 0x4}, {0x1, 0x2, 0x8, 0x3, 0x1800, 0x81}, {0x6, 0x394, 0xfffffff7, 0xc0000, 0x9, 0x6}, {0x6, 0x7fffffff, 0x6, 0x400, 0x40, 0x401}, {0x7fffffff, 0x4, 0x5, 0x400, 0x5, 0x1}, {0x4, 0x0, 0x80, 0x82, 0x8, 0x4}, {0x684f, 0x7, 0x9, 0x3, 0x8be, 0x4}, {0x0, 0xdc, 0x7ff, 0x0, 0xfc, 0x5f}, {0x6f18, 0x693, 0x3, 0x0, 0x80, 0x5b}, {0xc9aa, 0x7, 0x2, 0x3ff, 0x4, 0x5}, {0x7, 0x3, 0x99d, 0x7, 0x3, 0x3}, {0x1c, 0x2, 0x8, 0x1452, 0x4, 0x6}, {0x3, 0x1ff, 0x2, 0x6, 0x2ed8, 0x2}, {0x5, 0x1, 0x1, 0x10001, 0x1, 0x2}, {0x400, 0x1, 0x400, 0x9, 0x401, 0x3}, {0x2, 0x20, 0x3, 0x40, 0x100, 0xa00000}, {0xff, 0x0, 0x2, 0xcf, 0x10000, 0xa24}, {0x4, 0x7, 0x10000, 0x0, 0x7fff, 0x7}, {0x3, 0x6, 0x5, 0x4, 0x80000001, 0x8000}, {0x4, 0x0, 0x1, 0x401, 0x5, 0x8}, {0xfffffff9, 0x5, 0x3f, 0x1b, 0x1, 0x2}, {0x2000, 0x1ff, 0x2, 0x3, 0xed800000, 0x2}], [{0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x4}, {0x1}, {0x3}, {}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {}, {0x4}, {0x3}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {}, {}, {0x2}, {}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x4}, {0x2}, {0x4}, {0x2, 0x1}, {}, {}, {0x3}, {0x5, 0x1}, {0x3}, {0x3}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x2}, {0x1}, {0x5, 0xbedaf1801f009292}, {}, {0x1, 0x1}, {0x7323999a241d525d}, {}, {0x5}, {0x2}, {0x2}, {0x4, 0x1}, {0x3}, {0x4}, {0x5}, {0x7}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x2}, {0x1, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x5}, {0x3}, {0x6, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x2}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {}, {0xe}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x6}, {0x3}, {0x1}, {0x0, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0xff, 0x5, 0x20000000, 0x5, 0xffff}, 0x81, 0xb4, [{0x40, 0x9, 0xffffff80, 0x0, 0xde, 0xfffe0000}]}, [{0x9, 0x9, 0x4, 0xa37, 0x6, 0xf9c}, {0x3, 0x2b0, 0x1, 0x7, 0xfffffffa, 0x3e8}, {0x0, 0x3f, 0xaf, 0x8, 0x4, 0x1}, {0x4, 0x9, 0x4, 0x0, 0x1ff, 0x401}, {0x9, 0x7fffffff, 0x7, 0xe7cc, 0x7, 0x1}, {0x8, 0x4, 0x8, 0x101, 0x3, 0x1ff}, {0x1f, 0x1, 0x6b5, 0xfffffff7, 0x0, 0x40}, {0x2000, 0xd, 0x5, 0xd403, 0xffff}, {0x9, 0x3f, 0xfffffffe, 0x4, 0x9, 0x7d17}, {0x1ff, 0x101, 0xfff, 0x9cce, 0x5, 0x56f0}, {0x6c, 0x2, 0x0, 0x40, 0x4, 0xd4}, {0x3745, 0xc95, 0xffff, 0x101, 0xffff, 0xbffa}, {0x7, 0x80000000, 0x1, 0xffff, 0x9, 0x7}, {0x3, 0x81, 0x4, 0x6, 0x4}, {0x4, 0x9, 0x9, 0x3, 0x1f0, 0x6}, {0x6, 0x4, 0x8001, 0x4, 0x20, 0x697bbc5d}, {0x9, 0x5, 0x2, 0x45e337d, 0xa0000, 0x4}, {0xa3, 0x0, 0xd7, 0x2, 0x4a10, 0x5}, {0x6, 0x40, 0xffffffff, 0x4, 0x5, 0x692}, {0x80, 0x0, 0x1000, 0x0, 0x2}, {0x3, 0x400, 0xc3e, 0x619, 0x6, 0x8}, {0x40, 0x5, 0x80, 0xd8f2, 0x9, 0x5}, {0x2, 0x4, 0x7fff, 0x3, 0x1, 0xffffffe1}, {0x8, 0x3, 0x9, 0x54, 0xfffffffd, 0x9}, {0x9, 0x5, 0x7, 0x3ff, 0x2, 0xa23c}, {0x0, 0x40, 0xfffffffa, 0x1, 0x401, 0x9}, {0x4, 0x40000000, 0x3, 0x2, 0x0, 0x69}, {0x20, 0x8, 0x8cab, 0x7, 0x8, 0x5}, {0x80000001, 0x0, 0x4, 0x5, 0x2}, {0x844, 0x2, 0x9, 0x4, 0xc6b295, 0xffff}, {0x97, 0x4, 0x4, 0x6, 0x6, 0x8}, {0x6, 0x40, 0x5, 0x9, 0x400, 0x1f}, {0x4, 0xfff, 0x15, 0x10000, 0x10001, 0xff000000}, {0x8000, 0x0, 0x89, 0x497, 0x2, 0xaf65}, {0x1000, 0x1, 0x8, 0xff800000, 0x1ff, 0x5}, {0x1181, 0x1000, 0x80, 0x81, 0x6, 0x54cbd2fe}, {0xffffffff, 0x1ff, 0x1000, 0x6, 0x0, 0xc4f}, {0x7, 0x2, 0x6, 0x9, 0x2f601035, 0x6}, {0x3ff, 0x8, 0x4, 0x5, 0xfffffffe, 0x607}, {0x1000, 0x2, 0x3, 0xfffffff8, 0x80000001, 0x8}, {0x7, 0x7, 0x5, 0xf7, 0x6, 0x100}, {0x20, 0x5, 0x2, 0x1, 0x467, 0x9e3}, {0x101, 0x8, 0x5, 0x2, 0x3d, 0x8}, {0x7, 0x10000, 0xf9, 0x1fb, 0x3b6, 0x206e}, {0x4, 0x19f, 0x7a, 0x9, 0x40, 0x800}, {0xfffffffa, 0x81, 0x7f, 0x1ff, 0x4, 0x6}, {0x4, 0xffffffff, 0x4, 0xff, 0x183, 0x9b}, {0x4, 0x1000, 0x1, 0x8, 0xfff, 0x1}, {0x80, 0x200, 0x7, 0x3, 0x4, 0x3}, {0x6, 0x7, 0x4, 0x5b, 0x9, 0xffff7fff}, {0x5, 0x7e, 0x100, 0x401, 0x9, 0x2}, {0xfff, 0x80, 0x8, 0x8001, 0x2, 0x8}, {0xdc, 0x80, 0x7f, 0x2, 0x4, 0xb4a0}, {0x8, 0x6, 0x9, 0x8, 0x9, 0x101}, {0xffff, 0x5, 0x4, 0x200, 0x8fb3, 0x3}, {0x44887d10, 0x10001, 0x7, 0x7, 0x5, 0x20}, {0x3, 0x3, 0xfff, 0x0, 0x101, 0xffffffff}, {0x401, 0x3c, 0x414a, 0x6, 0xfffffff9, 0x9}, {0x7f, 0xffffffff, 0x1f, 0x2, 0x9, 0x8}, {0x800, 0x101, 0xffffffff, 0xfffe0, 0x4, 0x8}, {0x1, 0xffff, 0x134c9b56, 0x9, 0x3f, 0x6}, {0x400, 0x4, 0x4, 0x3, 0x9, 0x9}, {0x9, 0x81, 0x5, 0x2, 0x3c, 0x1f}, {0xffffffc0, 0x5, 0x0, 0xffffffe3, 0xffff0001, 0x7}, {0x2c, 0xffffff4e, 0x5, 0x1, 0x81, 0x9}, {0x1, 0x1, 0x3, 0x527c, 0x5, 0x88}, {0x0, 0x4, 0x0, 0x0, 0x200, 0xe6}, {0x5, 0x3, 0x896, 0x1f, 0x1, 0x8}, {0x10001, 0x0, 0x1, 0x1, 0x7, 0xc3}, {0x1, 0x200, 0x5, 0x100, 0xffff, 0x3}, {0xf127, 0x0, 0x5, 0xa65, 0x1}, {0xfff, 0x9, 0x1, 0x3aa5, 0x7, 0x6}, {0xffff, 0xffff, 0x200, 0x3671, 0xb2, 0x80000000}, {0xf8cc, 0x10000, 0x8001, 0x1, 0x1, 0x9}, {0x3f, 0x0, 0x1, 0x45c, 0x2, 0x80000001}, {0x2, 0x2, 0x7, 0x5, 0x8, 0x5}, {0x8, 0x101, 0x8d, 0x3b, 0x8001, 0x6}, {0x415c, 0x3, 0x81, 0x1f, 0x4, 0x8}, {0x4, 0x7fffffff, 0x20, 0x101, 0x401, 0x3}, {0x5, 0x100, 0x5, 0x10001, 0xae, 0x9a7}, {0x1, 0x101, 0x5, 0x9, 0x3c2, 0xfffffe8c}, {0x5, 0x0, 0x800, 0x2, 0x8000, 0x1}, {0x0, 0x100000, 0x9, 0x7, 0xe00000}, {0x6, 0x5, 0x200, 0x8, 0x7e26, 0x6}, {0x3f, 0x4, 0x1, 0x1f, 0x9}, {0x2, 0x81, 0x0, 0x1, 0x6, 0x1363}, {0x3, 0x3f, 0x7fff, 0x6, 0x1, 0x5}, {0x7, 0xfffff579, 0x6, 0x9, 0x1000, 0x1}, {0x1, 0x400, 0x81, 0xa2e, 0x8, 0x8001}, {0x8, 0x8, 0x8, 0x4, 0x0, 0x4}, {0x5, 0x2, 0x2, 0x6, 0x80000000, 0x2}, {0x3, 0x10000, 0x3, 0x3, 0x1, 0x5}, {0x2, 0x8001, 0x1, 0x6, 0x5, 0x9}, {0xa60, 0x2, 0x0, 0x9, 0x2a2d, 0x800}, {0x2, 0x4646, 0x0, 0x3, 0x6, 0x9}, {0x8000, 0x7, 0x15, 0x1f, 0x20, 0x7fff}, {0x7, 0x80, 0x8, 0x80000000, 0x7f, 0x5}, {0x3, 0x401, 0x101, 0x2, 0x2, 0x2}, {0x2, 0x5, 0x7, 0xfd7b, 0x7ff}, {0x4, 0x800, 0x9, 0x6, 0x3, 0xe5b9}, {0x6, 0x6, 0x7ff, 0x400, 0x6, 0x4}, {0x3, 0x1, 0x39, 0x0, 0x5, 0x5}, {0x8, 0xffff, 0x9, 0x8, 0x99, 0x400000}, {0x1, 0x7, 0x7, 0x7, 0x2, 0x4}, {0x8, 0x5, 0x80000000, 0x80000001, 0xffff, 0x6}, {0x40, 0x2face0f3, 0x16db6c28, 0x1, 0x1ff, 0x25e}, {0x1000, 0x8, 0x4, 0x707a, 0xfffffffa, 0x1}, {0x7e, 0x7ffffffb, 0xc33, 0x1ff, 0x401, 0x10b}, {0x40, 0x26, 0x1f, 0xa84, 0x83, 0x8}, {0x0, 0x9, 0xfffffff8, 0x6, 0x0, 0x5}, {0x5, 0x7, 0x42b23dba, 0x8, 0x9, 0x3f}, {0x6, 0x101, 0x80, 0x80000000, 0xfffffffb, 0xa36}, {0x1ff, 0x1, 0x1, 0x401, 0x2, 0x7fffffff}, {0x943c, 0x100, 0x81, 0x100, 0x737, 0x9}, {0x80000001, 0x7, 0xffffffff, 0x8000, 0x1f, 0x80}, {0x488, 0xbfa9, 0x3, 0xb9, 0x0, 0x100}, {0x401, 0xf, 0x0, 0xfff, 0x7f, 0x80000001}, {0x6, 0x400, 0x1, 0x8, 0x81, 0x80}, {0x10000, 0x88bb, 0x1, 0x81, 0x3, 0x5}, {0x1, 0xffffffe1, 0x8, 0xc0000, 0x7ff, 0x3f}, {0xfffffff9, 0xcd4, 0x9, 0x5, 0x4}, {0x3, 0x4, 0xd1d, 0x3070, 0x1, 0x101}, {0x1, 0x9, 0x7fffffff, 0xff, 0x5, 0x1}, {0x80000000, 0x1, 0x9, 0x7fffffff, 0x8, 0x1}, {0x2, 0x9, 0xa20, 0x3, 0x7, 0x100}, {0x7, 0x8000, 0xffff, 0x9, 0x3, 0x2}, {0x2, 0x670e, 0x4, 0x4, 0x0, 0x4}, {0x59d, 0x2, 0x9, 0x1, 0x2, 0x6}], [{0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x2}, {0x1de6c7183052835}, {0x4}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {0x4}, {0x2}, {0x4, 0x1}, {}, {0xbe6ca8bfccdd8fac, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x4}, {0x1}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x3}, {}, {0x3}, {0x3}, {0x1, 0x1}, {0x5}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {}, {0x4}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x7}, {0x3}, {0x2, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x3}, {0x4}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x3}, {0x4, 0x1}, {}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4}, {0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x2}, {0x3, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x54, 0x5, 0x0, 0x1, [{0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_KEYS_EX={0x34, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0x3e, 0x6, "223df0959dd89236c5f6f29b7e11b8ecde8e4b653843af06628cf13b71bc874d65342b08265cf3b72bf1dba2779824cd6281bd84c3495885ae95"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_police={0x21ac, 0x6, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x20dc, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0xfa}, @TCA_POLICE_RESULT={0x8, 0x5, 0x2}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x80000000, 0x4, 0x5, 0x6, 0x4, 0x800, 0x20, 0x8, 0x8, 0x1, 0x7, 0x800, 0x4, 0x9f29, 0xfffffff7, 0xc4, 0x0, 0x7, 0x27f, 0xe64, 0x1000, 0x2, 0x5, 0x81, 0x101, 0x8000, 0x4, 0x1f, 0x2, 0x7, 0x0, 0x80000001, 0x0, 0x800, 0xfff, 0x8, 0x4, 0xbab, 0x200, 0xe65, 0x1, 0xfffffff7, 0xfffff801, 0x7, 0x7f, 0x5, 0x1000, 0x2, 0x8000, 0xffffffff, 0x6000, 0xe18, 0x2, 0x0, 0x3de, 0xfffffffe, 0xe9, 0x1000, 0xdaf, 0xe777, 0x10a, 0x0, 0xffff, 0xfffffff9, 0x4, 0xb3, 0x2e20, 0x1, 0x0, 0xffff, 0xfffffffd, 0x10000, 0x9, 0x8000, 0x8, 0x400, 0x0, 0x1000, 0x305fdd0, 0x4, 0x7, 0x1000, 0x3ff, 0x10000, 0x120000, 0x1, 0x6, 0x400, 0x6, 0x0, 0x1, 0x0, 0x8, 0xffff0001, 0x0, 0x0, 0x3ff, 0x200, 0x34, 0x200, 0x5, 0x6, 0x1, 0x5b, 0x6, 0x96e, 0x4, 0x2, 0xffff, 0x1f, 0x10000, 0x9, 0x3, 0x0, 0xc4a, 0x8, 0x6b, 0x0, 0xbc, 0x401, 0x7, 0x8, 0x9, 0x7, 0x4, 0x3, 0x7, 0x6, 0x1, 0xff, 0x8, 0x20, 0x1, 0x2, 0x6, 0x4, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xe1b80000, 0x8, 0x0, 0xf6, 0x6, 0x400, 0x6, 0x5, 0x8, 0x2, 0x3, 0xffffff81, 0xfff, 0x4, 0x1, 0x6, 0x7, 0x5, 0x3, 0x10000, 0x794, 0x200, 0x80, 0x87, 0x7, 0x8, 0x0, 0x8, 0xffffffff, 0x6, 0x30, 0x9, 0x1000, 0x3f, 0x3f, 0x3, 0x6, 0x9, 0x1000, 0x0, 0x4, 0x7, 0x6, 0x9b9, 0x6, 0x7788, 0x9, 0x9, 0x7ff, 0x3, 0x1, 0x3ff, 0x400, 0x7fffffff, 0xc72, 0x7, 0x7fffffff, 0x7, 0x1000, 0x7ff, 0x8, 0x375, 0x6, 0x9, 0x80000000, 0x80, 0x59271275, 0x5, 0xfffffffa, 0x5, 0x40, 0x80000001, 0xe60, 0x32, 0x1ff, 0xffffffff, 0x3, 0xb1, 0x7f, 0x54d066a8, 0x9, 0x5, 0x3, 0x8, 0x8f, 0x0, 0xffffffff, 0x20, 0x8, 0xd3, 0xffff0000, 0x2, 0x88, 0x2, 0x4, 0xad, 0x695b1381, 0x8, 0x3, 0x20, 0x80000001, 0xadd, 0x7fffffff, 0x9, 0x7, 0x10001, 0x2, 0x3, 0x1, 0x3, 0x3, 0x393, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x2, 0x5, 0x7, 0x4, 0x6, 0xde6, 0x0, 0x6c88, 0x9, 0x3, 0x8001, 0x2, 0x100, 0x7, 0xfc0, 0x21a70, 0x4, 0xea32, 0x7f, 0x0, 0x770, 0x4, 0x3ff, 0xffff, 0x3, 0x80000000, 0x65, 0x422, 0xce7b, 0x1, 0x9f5b, 0x0, 0x80, 0x9, 0x8, 0x20, 0x6, 0x6, 0xba59, 0x635e, 0x400, 0x7, 0x750, 0x9e4, 0x8000, 0x200, 0x3, 0x5, 0x3, 0x6, 0x1000, 0x6, 0x1, 0x0, 0x2, 0x1ff, 0xfffffff7, 0x0, 0x81, 0xfffffffa, 0xfffff721, 0x400, 0x5, 0x4, 0x8001, 0x8, 0x4, 0xa093, 0x2, 0x3, 0x0, 0xfbf0, 0x3, 0x6, 0x5, 0x3, 0x0, 0xffff, 0xf23a, 0x1, 0x6, 0x9, 0x8001, 0x2, 0x5, 0x2, 0x7, 0x8, 0x40, 0x9, 0x3, 0x7, 0x1, 0x81, 0x1, 0x77, 0x2, 0x80000000, 0xffff, 0x9, 0xffff, 0x6, 0x1, 0x8001, 0xefe2, 0x6, 0x0, 0x8, 0x9, 0x4adb, 0x101, 0x4, 0x2, 0x5, 0xe458, 0x5, 0x8, 0x8000, 0x0, 0xc90, 0x7, 0x6, 0x10000, 0x3, 0x8, 0x1, 0x1, 0x3e, 0x80000000, 0x0, 0x100, 0x1, 0x0, 0x6c, 0x7fff, 0x7, 0x4, 0xffff, 0x7, 0x10001, 0x0, 0x3, 0x3, 0x4040, 0x4, 0x5, 0x7, 0x20, 0x1, 0x2, 0x8000, 0x1, 0x51, 0x2, 0x3, 0x9, 0x7f6, 0x4, 0xffffff68, 0x6, 0x1, 0x400, 0x8, 0x5, 0x5, 0x7, 0xe0b, 0x980, 0x101, 0xffff, 0x2, 0x100, 0x0, 0x4, 0x21509176, 0x5, 0x7fff, 0x6, 0x8000000, 0x4, 0x1, 0x8, 0x8, 0x7fffffff, 0x10000, 0x2, 0x80000001, 0x3, 0xa9, 0x8, 0x5, 0x3, 0x80000001, 0x98, 0x8, 0x0, 0xe21f, 0x1000, 0x5, 0xfffffffc, 0x3a4000, 0x6, 0x4, 0x2383, 0x1, 0x2, 0x100, 0x8, 0x8, 0x200, 0x2, 0x5, 0x0, 0xfff, 0xeb, 0x1, 0x3, 0x80000000, 0x4, 0x8000, 0x7, 0x711, 0x0, 0x0, 0x1f, 0x5, 0x25, 0x5, 0x19, 0x1, 0x3, 0x3, 0x0, 0x200, 0x9, 0x5, 0x5, 0x0, 0x4, 0xfffff800, 0x7f, 0x96, 0x3, 0x7a7895a6, 0x200, 0x1000, 0xffffffff, 0x7, 0x59d, 0x1, 0x0, 0x5, 0x0, 0x4, 0x3]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x3, 0x9, 0x4, 0xff, 0x80000000, 0xf4, 0x8, 0x4, 0x8000, 0x4, 0x3, 0x800, 0x5, 0x23, 0x5, 0x0, 0x81, 0xfff, 0x810000, 0x401, 0x3, 0x8, 0x1, 0xfff, 0xffffffc0, 0x965, 0x100, 0x5, 0x101, 0x2, 0x7, 0x1, 0x7, 0x1, 0x7, 0x4, 0x2, 0x0, 0x9, 0xfff, 0xfffffffe, 0x40000000, 0x2, 0x0, 0xffff, 0x1, 0x81, 0x8, 0x3, 0xd7, 0xff, 0x8, 0x7ff, 0x2, 0x5, 0xfff, 0x1200000, 0x1, 0x7f04, 0x80000001, 0x9, 0x3, 0x6, 0x3, 0x6, 0x1ff, 0xffff6898, 0x7, 0x7, 0x1, 0x5, 0x81, 0x74c, 0xff, 0x7fffffff, 0x200, 0x3, 0x9, 0x3ff, 0xff, 0x8, 0x4, 0x3, 0x9, 0x9, 0xfcc, 0x1, 0x0, 0xe035, 0x100, 0x40, 0x2049d664, 0x200, 0x0, 0x8, 0x2, 0x4, 0x7, 0x5, 0x8, 0x3, 0xfffffff9, 0x9, 0x2, 0x1, 0xfa, 0x87, 0xfff, 0xd320, 0x1917, 0x1, 0xf132, 0x9, 0x80000001, 0x5, 0xf9e5, 0x9, 0xfffff7f2, 0x5, 0x9, 0x6, 0xa66, 0x5b2, 0x1, 0xffffffff, 0x4, 0x80000001, 0x9, 0x3, 0x0, 0x6, 0x6, 0x4774, 0xfffffffa, 0xffff, 0x7, 0xc7, 0x9, 0x3f, 0xffff, 0x7, 0x20, 0x1f, 0x6, 0x5, 0x3, 0x5, 0x5, 0x5, 0x3, 0x4, 0xab, 0x6, 0x84, 0x7f, 0x3ff, 0x0, 0x4, 0x4, 0xffffffff, 0x2, 0xffff0000, 0x5, 0x400, 0x2, 0x8f, 0x0, 0x7, 0x856, 0x8, 0x352, 0x3f, 0x5, 0xbfe0, 0x7, 0x9, 0x9, 0x5, 0x9, 0x2, 0x1, 0x3ff, 0x9, 0x1, 0x3, 0xffffffff, 0x13, 0x3, 0xf5d9, 0x6, 0x6, 0x8, 0x7, 0x85, 0x0, 0x5, 0x0, 0x1, 0xdc08, 0x5, 0x7fffffff, 0x7, 0x1, 0x3, 0x0, 0xd4, 0x20, 0x2, 0x5, 0xa03, 0x80000000, 0x7, 0x7cb4, 0x5, 0x6, 0x7, 0x2, 0x5, 0x1ff6, 0x8, 0x0, 0x4, 0x3, 0x4, 0x6, 0x21b, 0x7044, 0x7, 0x10001, 0x7, 0x2f, 0x1, 0x5, 0x7ff, 0x40, 0x7fff, 0x9, 0x3, 0x9, 0x4, 0x3f, 0x9, 0x7fff, 0x1601, 0x8, 0x282, 0x8, 0x7, 0x80000000, 0x1, 0x7d6290c0, 0xe89e, 0x6, 0x8, 0x5]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x6, 0x80000000, 0x5, 0x52600000, 0x0, 0x20, 0x1, 0x7, 0x800, 0x2, 0x1, 0x1, 0x81, 0x0, 0x200, 0x80, 0x7, 0x3, 0x6, 0xffffffff, 0x7, 0x80000001, 0x7, 0x80000000, 0x20, 0x401, 0x401, 0x5, 0xffffffff, 0x4, 0x7, 0x6, 0x0, 0x8075, 0x2209, 0x80000000, 0x6, 0x6, 0x9, 0x81, 0x737e6bd2, 0x4, 0x7f, 0x2, 0x6, 0x8, 0x8, 0x1, 0x4, 0x1, 0x56, 0x0, 0x6, 0x3ff, 0x6, 0x3, 0x80000001, 0x1, 0x8, 0x200, 0xff, 0x4, 0x5, 0x2, 0x2, 0x401, 0x80000001, 0x6, 0x1000, 0x80000001, 0x0, 0xfffffffb, 0x5, 0x81, 0x7, 0x8000, 0x101, 0x6a, 0x0, 0xfb6, 0x7, 0x100, 0x4, 0xff, 0x101, 0x4, 0x10001, 0x7, 0x9, 0x8, 0x4, 0x8000, 0x4, 0x3, 0x8, 0x7, 0x7f, 0x1ff, 0x8, 0x7fffffff, 0x3, 0x49, 0x8, 0x3, 0x7d66, 0x4, 0x200, 0x5, 0x7fffffff, 0x5, 0x6, 0x80000001, 0x6, 0xffffffff, 0x3, 0x3, 0x7fff, 0x8, 0x2df, 0x0, 0x7, 0x0, 0x4, 0x4, 0x0, 0x77, 0x0, 0xff, 0x5, 0x4, 0x10001, 0x5d4b, 0x8, 0x8000, 0x2fa, 0xd798eec6, 0xfffffffd, 0x8, 0x3f, 0x3ff, 0x9, 0xffff, 0x1, 0x3, 0x944c, 0xff, 0x2, 0xae, 0x3, 0x9, 0x8, 0x0, 0x2, 0x1, 0x101, 0x4, 0x9, 0x5, 0x6, 0x401, 0x100, 0x4, 0x3, 0x20, 0xfff, 0x7fffffff, 0x4, 0x9, 0x6, 0x6, 0x10000, 0x1000, 0x27, 0x80000001, 0xfff, 0x5, 0x4, 0xa1, 0x578, 0x2, 0x0, 0x4, 0x2, 0x7, 0x7, 0x6, 0x6, 0x0, 0x3f, 0x45ee, 0xc6cc, 0x101, 0x100, 0x6, 0x4, 0x4, 0x9, 0x7, 0x8, 0x9, 0x7, 0x9, 0x8000, 0x8, 0x7, 0x1000, 0x101, 0x7a000000, 0x8, 0x9, 0x6, 0xc2, 0x9, 0x11b4, 0x2, 0x3, 0x2, 0x7, 0x6e, 0x73251fda, 0x0, 0x8, 0x9, 0x7, 0x32, 0x3, 0x1, 0x9, 0x6, 0x10000, 0x8001, 0x2, 0xffffff45, 0x1, 0x4, 0x6, 0x8, 0x6, 0x3, 0x0, 0x7, 0x7, 0x9, 0x5, 0xdc2, 0x8, 0xe7, 0x5a, 0x6, 0x4, 0x1, 0x1, 0x200, 0x3, 0x7fffffff]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x6, 0x5, 0x6, 0x100, {0x9, 0x1, 0x50, 0x8, 0x3ca, 0x95}, {0x8, 0x1, 0x400, 0x3f, 0x20, 0xef28}, 0x1, 0x2a544921, 0x7}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x80000000, 0x97, 0xfff, 0x6, 0x3, 0x9, 0x7, 0x0, 0x401, 0x63, 0x7, 0x100, 0x4, 0x4, 0x1, 0x7ff, 0x2a, 0x40, 0x1, 0x80, 0x3, 0xa033, 0x8, 0x1, 0x4, 0x57, 0x8, 0x6, 0xfffffffb, 0x8, 0x5, 0x74f5, 0x3fa, 0x7, 0x800, 0x0, 0xd43, 0x4, 0x8, 0x4, 0x2, 0xcc8f, 0x8001, 0x6, 0x5, 0x7f, 0x40, 0x1, 0x9, 0x9, 0x2, 0x40, 0x4, 0x26b, 0x6, 0x2, 0xfffffffe, 0x43f0d152, 0xfffff317, 0x7, 0x7ff, 0xf296, 0x4, 0xa3, 0xffffffff, 0x9, 0x81, 0x1, 0x4, 0x1, 0x101, 0x800, 0x7, 0x6, 0x44, 0x5, 0x6394, 0x4, 0x4, 0xffffffff, 0xfffffff7, 0xff, 0x5, 0x921c, 0x10000, 0x7, 0x34b767d8, 0x80, 0xffffffa5, 0x0, 0x5, 0x1, 0xd7b7, 0x9, 0x3, 0x3ff, 0x0, 0xfffffff8, 0x5, 0x1, 0x1, 0x15568000, 0x7b00, 0x1, 0x4, 0x7fffffff, 0x9, 0x0, 0x80, 0x8879, 0x100, 0x4, 0x7, 0x8, 0x3, 0x918, 0x6, 0x3ab, 0x10001, 0x8, 0xfffffffc, 0x7, 0x9, 0x5, 0x7, 0x2, 0x7ff, 0x5, 0x6, 0x5, 0x3, 0x7, 0x7, 0x5, 0x4b13e185, 0xab, 0x2, 0x401, 0x8, 0x401, 0x7, 0x6, 0x6, 0x2, 0x707, 0x6, 0x3, 0x416b9129, 0xef56, 0x3, 0xf1, 0x81, 0xffffc4aa, 0xff, 0x0, 0x81, 0x6, 0x7, 0x5, 0xfffffff8, 0x80000000, 0x80000001, 0x9c48, 0x6, 0x7fffffff, 0x8, 0x200, 0x6, 0x3ff, 0x3, 0x19d4e01d, 0x6, 0xa5a, 0x1, 0x2000, 0x8, 0x9, 0x60, 0x9, 0xfffffffc, 0xfffffff8, 0x3c, 0x9, 0x7, 0x0, 0x0, 0x3, 0x6, 0x10000, 0x4, 0x1, 0x5, 0x2, 0x6, 0x3, 0x81b, 0x7fff, 0x3d, 0x401, 0x2, 0x1, 0x8, 0x8, 0x0, 0x8001, 0x2, 0x4, 0x3f, 0x7ff, 0x1da8fb6f, 0x9, 0x2, 0x1, 0x2, 0x8, 0x800, 0x3, 0x6, 0x3f, 0x2, 0x40, 0x6820, 0x3, 0xfffffffd, 0x8, 0x0, 0x7, 0x1, 0x4, 0x474d026c, 0x10001, 0x8000, 0x4, 0x7, 0x9, 0x40, 0x5, 0x80000001, 0x3, 0xc0000000, 0x3, 0x7000, 0x22c, 0x2, 0xc82, 0x6beb, 0x4, 0x0, 0x6, 0x48000000, 0x4, 0x0, 0xe0, 0x19, 0x6, 0x7ff]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x1, 0x9, 0xfff, 0xfffffffe, 0x4, 0x100, 0x8, 0x9, 0x4a, 0x3, 0x7, 0x6, 0x1, 0x8, 0x6, 0x8aaa, 0x3, 0x9, 0x7, 0x7, 0x2, 0x1, 0x1, 0x9, 0x6, 0x38, 0x5f5739fc, 0x800, 0x10000, 0x8000, 0x5, 0x6, 0xfffffffe, 0x7fffffff, 0xfaf, 0x80000001, 0xffff, 0x2f8, 0x6, 0x80000000, 0x8, 0x5, 0x1, 0x493, 0x3, 0xb80f, 0x7, 0x7fffffff, 0xffffffff, 0x3, 0x0, 0x5, 0x5, 0x2, 0x5, 0x7c, 0x3, 0x81, 0x1, 0x1, 0x7, 0xff, 0x3eda, 0x9, 0x7, 0x0, 0x7ff, 0x8, 0x1f, 0xf91e, 0x2, 0x4, 0x0, 0x6, 0x15a, 0x1, 0x1ff, 0x10000, 0x2, 0xab0a, 0x80, 0xfffff000, 0xf22, 0x0, 0xfffffffb, 0x8, 0xffff, 0x9, 0x5, 0x8000, 0x2479, 0x23, 0xa63d, 0x3, 0x7fffffff, 0x7fff, 0x7, 0x8, 0x800, 0x8, 0x9, 0x9, 0x2, 0x8, 0x9, 0x3ff, 0xfffffff8, 0x2, 0x2, 0xb91, 0x0, 0x4, 0x50, 0x3ff, 0x6, 0x2, 0xfffff92b, 0x8, 0x8, 0x6, 0x9, 0x5, 0x0, 0x8, 0x3, 0x9, 0x3, 0x6, 0x3, 0x3, 0x1, 0x180000, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x3, 0x10001, 0xa76, 0x0, 0x10001, 0x4, 0x7, 0x9, 0x9, 0x4, 0x5, 0x40, 0x6, 0x1, 0x5, 0x1, 0x6, 0xfffffff9, 0xbe3, 0xf133, 0x1, 0xffffffc1, 0x8, 0x800, 0x2, 0x8, 0x7fff, 0xffff, 0x8, 0x6, 0x80000001, 0x2, 0x25, 0x3f, 0x8, 0x7, 0x5, 0x6, 0x9, 0x6, 0x80000000, 0x4, 0xfc95, 0x6, 0x3, 0x1, 0x27f, 0x8, 0x7, 0x10001, 0x7, 0x0, 0x2, 0xffffffff, 0x7, 0x1, 0x9, 0x7, 0x0, 0xffffffff, 0x4, 0x80000000, 0xd1, 0x7f, 0x2, 0x80000001, 0x9, 0x7, 0x5, 0x100, 0x80000001, 0x1, 0x5, 0x5, 0xfca, 0x3, 0x6, 0x2, 0x3724d9ad, 0x7, 0x401, 0xffffffff, 0x10000, 0x4, 0x6, 0x10000, 0xff, 0x3, 0x7f, 0x3, 0x4, 0x1f, 0x80, 0x1, 0x8, 0x2, 0x4, 0xffff, 0x800, 0xf6, 0x6, 0x3, 0x4, 0x7f, 0x80000001, 0x620, 0x401, 0x2, 0x97, 0x3fc00000, 0xa32, 0x8, 0x8074, 0x80000000, 0x1, 0x9, 0x5]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xc, 0x3ff, 0x0, 0x400, 0x5, 0x9, 0xfff, 0x2, 0x80000001, 0x5, 0x1, 0x400, 0xfffffffc, 0x20, 0x4b10de71, 0x3f, 0x746c, 0x3, 0x7fff, 0x6, 0x40, 0x10001, 0x7fff, 0xfffffff8, 0xffffffff, 0x7, 0x100, 0x1, 0x9, 0x5, 0x7fff, 0x4, 0xffff0c35, 0xfffff001, 0xbb, 0x80000001, 0x5, 0xfffffeff, 0xfffffffa, 0x2, 0xf0, 0x3ff, 0x0, 0x5, 0x1, 0x343, 0x1000, 0x0, 0x1ff, 0x8000, 0x7, 0xffffffff, 0x1, 0x753d2bea, 0x1, 0xffffff81, 0x200, 0x8001, 0x7, 0x4, 0x9, 0x2, 0x3, 0x20, 0x0, 0xe9, 0x80000000, 0x7ff, 0x4, 0x2, 0x4, 0x10000, 0x6, 0xb09e, 0x400, 0x10000, 0x5, 0x8, 0xffffffff, 0xeb, 0x6, 0x4d, 0x0, 0x6, 0x1, 0x1b44, 0x0, 0xffff, 0xf1e, 0x7, 0x1, 0x9, 0x0, 0x7, 0x8, 0x1ff, 0x7f, 0x5, 0x1, 0x1000, 0x7, 0x7f, 0x0, 0x3, 0x1000, 0x1, 0xfff, 0x0, 0xfff, 0x3, 0x3, 0x1000, 0x2, 0x10001, 0xadb, 0xffffffff, 0x800, 0x7, 0x0, 0x3, 0x3ff, 0x5, 0xf3, 0x1, 0xff, 0x4, 0x7f, 0x101, 0xffff, 0x1, 0x101, 0x303, 0x3f, 0x7f, 0xffff, 0x50, 0x401, 0x5, 0x29d, 0xf4, 0x4, 0x1ff, 0x10c3, 0x3, 0x3, 0x3, 0x7, 0x6, 0x1, 0x20, 0x5, 0x20, 0x20, 0x6, 0x8, 0x8001, 0x2, 0x101, 0x3, 0x4, 0x401, 0x9ff, 0x51b, 0x0, 0x6, 0x3f, 0xcf1d, 0x7, 0x3f, 0xffff, 0x7ff, 0x5, 0x6, 0x3, 0x1970, 0x1ff, 0x3f, 0xfffff487, 0x9, 0x9, 0x7, 0x9, 0x40, 0xf2, 0x800, 0x2, 0xbc, 0x54c6fdc9, 0x6, 0x3ce76205, 0x80000001, 0xfff, 0x10001, 0x8, 0x6, 0x2, 0x0, 0x9, 0x5, 0x2, 0x2, 0x1, 0xfffffbff, 0xafd1, 0x73dc, 0x7, 0x7, 0x8, 0x4, 0x8, 0x800, 0x20b67352, 0xac, 0x6, 0x4c2c4409, 0x1, 0x9, 0x7, 0x3a46, 0x6d24, 0x3, 0x5, 0x0, 0x2, 0x20, 0x8001, 0x9, 0xc07e3b5a, 0x6, 0x40, 0x7ff, 0x1, 0x9, 0x3ff, 0x4, 0xc14, 0x0, 0x4, 0xfffffff9, 0xe5e, 0x0, 0x401, 0xfffffff7, 0xfff, 0x3, 0x7, 0x6, 0x4, 0x1, 0x7201, 0x3ff, 0x9, 0xe, 0xf3ca, 0x373]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x101}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x80000001, 0x1f, 0x100, 0x80000001, 0x240, 0x7fff, 0xffffffff, 0x0, 0x100, 0xc3, 0xb105, 0xaac, 0x2, 0x0, 0x7ff, 0x1f, 0x9a, 0xe69, 0x7, 0x4, 0x1f, 0x4, 0x6, 0x80000000, 0x40, 0x3, 0x6, 0x7, 0x67, 0x6, 0x4dd, 0x8, 0x0, 0x1, 0x5, 0x2, 0x9, 0x0, 0x86, 0x4, 0xe3, 0x6, 0x8, 0x6, 0x1000, 0x7, 0x5, 0x5, 0x2, 0x7fffffff, 0x10001, 0x80, 0x7, 0x4, 0x2, 0x2, 0x40, 0x3, 0x6, 0x5, 0x101, 0xffffffff, 0x0, 0x1, 0x2, 0x75, 0xff, 0x4, 0x7fff, 0x4d, 0x200, 0x2, 0x2, 0xffff, 0x8, 0x2, 0xbd9efe1, 0x0, 0x10001, 0x5b, 0x1, 0x3ff, 0x800, 0x4, 0x5, 0x14, 0x6, 0x3, 0x8000, 0x3, 0x4, 0x1, 0x401, 0x2, 0x1ff, 0x8, 0x1, 0xe, 0x6, 0x7, 0x2, 0x7f, 0x7, 0x183, 0x37c47f2f, 0x40, 0x9, 0x6, 0x0, 0x5, 0x4, 0x101, 0xdbab, 0x79, 0xfffffff9, 0xb68, 0x0, 0x7ff, 0x4, 0x0, 0xcbd, 0x0, 0x384, 0x80000000, 0x6cd82559, 0x401, 0x6, 0x3f, 0x0, 0xfffffff8, 0x1, 0x0, 0x100, 0x9, 0xff, 0x3, 0x7fffffff, 0x46, 0x0, 0x4, 0x8, 0x3, 0x6, 0x4, 0x9, 0x1, 0x1, 0x9, 0x0, 0x0, 0x0, 0x7, 0x5a592434, 0x6, 0x7, 0x8001, 0x400, 0x10001, 0x4, 0x7, 0x4, 0x6, 0x10001, 0x8, 0xfffff801, 0x7ff, 0x4, 0x0, 0x1000, 0x7fffffff, 0x4, 0x101, 0x5, 0xffffff1e, 0x80, 0xf3c, 0x0, 0x0, 0x96f3, 0x9, 0x4, 0xffffffff, 0x6, 0x2, 0x25f, 0x8000, 0x10001, 0x7ff, 0x7, 0x5, 0x7, 0x7cd, 0x100, 0x6, 0x6, 0x8a, 0xff, 0x4, 0x80000001, 0x1, 0x5, 0x1, 0x2680, 0x1f, 0x5, 0x1a1, 0x2, 0x5300000, 0x2, 0x0, 0x1, 0x7, 0x7, 0x1a, 0x7, 0x9d3f, 0x40, 0xffffffe0, 0x101, 0x3f, 0x8, 0x3, 0x5, 0xb5ef, 0x1000, 0xfc000000, 0x80000001, 0x7fffffff, 0x7fff, 0x401, 0x7fffffff, 0x1878405f, 0xffff8001, 0x7, 0x7f, 0x1, 0x7, 0x64, 0x1, 0x1, 0x55a, 0x7, 0x3, 0x8000, 0x10000, 0x200, 0x0, 0x0, 0x13e1, 0xfff, 0x2, 0x6, 0x5, 0x7, 0x6]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x50f}], [@TCA_POLICE_RATE64={0xc}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x4, 0x1, 0x10001, 0x7, {0x7, 0x2, 0xa391, 0x6, 0x400, 0x1}, {0xec, 0x2, 0x4, 0x0, 0x6, 0x5}, 0x5fb, 0x100, 0x80000000}}, @TCA_POLICE_AVRATE={0x8}]]}, {0xa7, 0x6, "117c8b22cf0d0c9c18f287d9e32d4761953a9449ceb1b0c2c9cc2c7a811e536e44b1183165d33ea52aee932b658bca8582b81d253c72d1c5b068b70602d49f04f5aa64232e266cf5dd23d72f4b871addb40c6bf8179f69a7659b6dc21162006a11e8848c2aebc8ac997416db3e723d12817adb70bf43d84614649ce03f4f5f24fcfd4dfa64c61c739a181cc35a2f3a995043a76cf25a3422c6b28aa58451cd21cecd39"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_vlan={0x114, 0x9, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}]}, {0xdd, 0x6, "bb4d74c0c4bc09eb37c7cbb03120f187bc471be6dc069ff7ef7394d305565fa9a040fdc177ba763af2e66850bc7d32f92336a61252bceecb294180129c318a03fd02a07701d9a40c68be9851c2667c1c0756b511120b2c179232fe89054bb3f15ed10f4db721bea7feae204d007fd99ffcca248db1b850aeffe36339c4430dc0a2f5c58c4d7282c9546c1d23c6d5a5359ffea03f63fcaf2030b362d8346d772cd796f76bdbc8c514632b8c32d9df0c71d2da35c8b790c59c58ef37aaec7ce2ed1671e7a798393898dba0376746ba1fc8c43547c7b77cf2b3c0"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_mirred={0xe0, 0x1c, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x200, 0x5, 0x3, 0x4}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x349, 0xfffffffffffffffb, 0x6, 0x800}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0x5, 0x20000000, 0x2ae1, 0xfffffff9}, 0x4, r1}}]}, {0x53, 0x6, "96d69d711533c1269029549592bdd4f8e39e474d0dac4f26a7f866d62690c257444035f234651f102d7e9759d08f07a26cadeb21c7558b9478d2ddd89604a1d3d08fb39d5da6ad354483f830abe69f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_vlan={0xb8, 0x1a, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x7a3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x141}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xd09}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x5c, 0x6, "1d22dae6534468772bccb23ea11e2b73aa2fb07082e0863fb402ad3b2c37a08e9f517935382688588e84b192c4e9bcc713458894d43adfe0c7208ac0c0d0a821356c715b070d47de0ea5e2a0378dd71eaca93b92e90335c1"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_bpf={0x148, 0x1f, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x7c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x1c, 0x4, [{0x5, 0x56, 0x4, 0x1}, {0xffc1, 0x0, 0x20, 0x2}, {0x6, 0x7f, 0x3, 0xa3}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x4cbf, 0x54c, 0x2, 0x80000000, 0xd000000}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0xa}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xa8, 0x5f84, 0x10000000, 0x1, 0x5}}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{0x8000, 0xf1, 0x0, 0x3}, {0xe, 0x4, 0x8, 0x7}, {0x4, 0x7, 0xff, 0x6}, {0x316, 0x7, 0x40, 0x8}]}]}, {0xa6, 0x6, "9bd929af19c8bb75c8517d1a8e591990ecb9a1eadea3be6df5f1810809a83db655c11d16395e6951c370e77b4a3143e9e97eead2d2aaa7629bf80ac8cfc330c6c25d9e0181616e13694aaa2d950b1f2d2c356d198c4ea452e6c24a25f0448ecbe0e1bcc00b2de7a97e55d7e037400e798ce6ee76c308a6caf1a58332e755a5a4370d9c802113d07ee3f78e0c52c9fa364a81028b2186300d2e325fd074b8587d6c22"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_skbedit={0xfc, 0x8, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0xe7, 0x800, 0x3, 0x101, 0x5373}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xa, 0x4}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x51f}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x7ff}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x8}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xffe0, 0x9}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}]}, {0x7f, 0x6, "0d3c9066d0baf8b024fe517d1f651c69d76645e77278a45cd3b98535231a9967608b46af98e7118373c7902ec02de5d3e9c5651f79787c347a5f6cd0f6690248893289a1f94eb6395a82708464961b50ee2f0e7cc166f232181e0913a1b60def3e79bef2341276e0a94068aa268c9393e9bff32ab23ae98ffae6cd"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x140, 0x8, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x231}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x7, 0x0, 0x2, 0xec99}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x10, 0xffe0}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x1ff}]}, {0xe4, 0x6, "a88e9a42c3b96c0c4d98ab0c1dc5a6666904baefc35a0b995f6b2de443e6fff62cb8a03f38babaaf6eca71c47c62799fc6992aa7ce7fe5244d2e96648d07fe7564a63ed70df83d25ce803730a0f1b9c0291c524bd767443c3a88d506f5c2ad776448eabbc83bacefeccd82acc11e7a692044ce2266177cbf01985826eefbfd52454a3e81bb425b939060813d5903bb6e75214967e697c17a923d480292722a9e7372b423163bd74aab67491aa0856d60ebf484bba81f510a4000b44d0e02dacff4522a27d456cd7c86d347ad8ae8fb1f4f4e634ed72fbcc660bc6708f60d0a3b"}, {0xc}, {0xc, 0x8, {0x2}}}}]}, @TCA_BASIC_EMATCHES={0x210, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8000}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5}}, @TCA_EMATCH_TREE_LIST={0x1fc, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x64, 0x2, 0x0, 0x0, {{0x0, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_DATA={0x4b, 0x5, "30496d4acb39b1df884d66b0de90d72ab736bba0d59370cf12e318e97e3f702c46ea54de4fc08b3d5f76b876550979c98422bfb01a349e5a11fead999323fc17ef7ff2db088751"}]}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x7, 0x7, 0xd7c0}, {{0x1, 0x0, 0x1}, {0x1, 0x1}}}}, @TCF_EM_CONTAINER={0x88, 0x2, 0x0, 0x0, {{0x7ff, 0x0, 0x1}, "085a236a913b88fa75efe26a187bba8b6fa2f18608f008690292976c9fca7899e5cf1f521ec3a732c49dbe075e7d90749fc81e2733911975108f19ff1efa475f80c58b1a18fa5dcc61d6dd284ae453818228fe14181f79d7733403eef53bf10358bfb2aff387a0c361df89c0917c8669a9f746a04662e74606"}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x7, 0x8, 0x4}, {0x4, 0x1}}}, @TCF_EM_NBYTE={0x1c, 0x2, 0x0, 0x0, {{0x0, 0x2, 0x9d94}, {0x5, 0x9, 0x2, "4e98d8c9c0335e1652"}}}, @TCF_EM_CONTAINER={0xbc, 0x2, 0x0, 0x0, {{0xb45, 0x0, 0x80}, "832b3e51d2f5ff3158d24eb1d756f922b64a4300339f92bf3253b80f1971e3b0163d9260431788af23905825a7bcb6625ddfd8065cd2615b87a3e5abb9028d01141c257b63bd8c19ce6fb64a32c2b386548cb20ab72cee6cbc10129e7e44c1adcbf9f627e4439ce5e6e67ba5cd8e0c0aae863a6749c11a380699eeaba1ba897935084f4c82949f3bf259c3f7b2230af197b9de072441442f7cea94461a9f77fc6cd01196294119b9578ea5b03b"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x200, 0x8, 0x7c7c}, {0x3, 0x3, 0x1}}}]}]}, @TCA_BASIC_POLICE={0x2c, 0x4, [@TCA_POLICE_RESULT={0x8, 0x5, 0x76}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x200}, @TCA_POLICE_RATE64={0xc, 0x8, 0x4d}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8d6d}]}]}}]}, 0x8bb4}}, 0x0) write$binfmt_script(r5, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'vlan\x00'}, {0x20, 'batadv0\x00'}, {0x20, 'batadv0\x00'}, {0x20, 'batadv0\x00'}, {0x20, 'vlan\x00'}, {0x20, 'batadv0\x00'}], 0xa, "740b2c6aa436efc7701817d4db1444b38e156e5329c5042b3e76956ee471eee3a5d5dfade4f9113929a31547f9064a2167b1562a7c8c288a840eeff1b8508260f390f8f1143954c6da9c52294c614e82a520a5d49688ffe1fd11597121628a7486e4885e835f48e14e8c892b3b07e05c00fe05bb457b8da5b20969dd5fa7c115709b69c203c35c0ada1237"}, 0xc6) 15:56:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x612}, 0x0) 15:56:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x900}, 0x0) 15:56:16 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000070000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:16 executing program 4: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)={{0x107, 0x9, 0x6, 0x2fa, 0xcb, 0x2, 0x33b, 0x4c08}, "e15889948f3ea48c7bb00b48ab9791b13bc058dfe70a9643073c427834aade1e883413430c58b21a57e6024258c135c40e6ab38b4adf7806777e", [[], [], [], [], []]}, 0x55a) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1534.115344][T16811] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xe00000000000000}, 0x0) 15:56:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa00}, 0x0) [ 1534.186517][T16811] device ipvlan875 entered promiscuous mode [ 1534.261941][T16830] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1534.325704][T16830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1534.429101][ T29] audit: type=1804 audit(1591890976.686:786): pid=16853 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1023/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 1534.606399][T16853] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1534.835757][T16832] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1534.846208][T16832] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1534.863230][T16837] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1534.904607][T16837] device ipvlan876 entered promiscuous mode 15:56:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c80535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb00}, 0x0) 15:56:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc00}, 0x0) [ 1535.062084][T16838] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1535.079297][T16838] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe00}, 0x0) [ 1535.249832][ T29] audit: type=1804 audit(1591890977.456:787): pid=16855 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1023/cgroup.controllers" dev="sda1" ino=16382 res=1 15:56:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r4) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000200)="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") sendfile(r3, r0, 0x0, 0x3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r2, 0x0, 0x100002a00) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) accept$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, &(0x7f0000001200)=0x1c) 15:56:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf00000000000000}, 0x0) 15:56:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf00}, 0x0) 15:56:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd"], 0x6) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x4c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYRES16=r3, @ANYBLOB], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x50, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xea8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4044011) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100002a00) [ 1536.826987][ T29] audit: type=1804 audit(1591890979.086:788): pid=16902 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1024/cgroup.controllers" dev="sda1" ino=16377 res=1 [ 1536.905155][ T29] audit: type=1804 audit(1591890979.156:789): pid=16898 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/1007/cgroup.controllers" dev="sda1" ino=15735 res=1 [ 1536.919604][T16873] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:19 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000080000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1100}, 0x0) [ 1536.977927][T16878] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1200}, 0x0) [ 1537.023332][T16878] device ipvlan877 entered promiscuous mode [ 1537.050778][T16889] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1537.091720][T16889] device ipvlan878 entered promiscuous mode 15:56:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025c90535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1000000000000000}, 0x0) 15:56:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1206}, 0x0) 15:56:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1300}, 0x0) 15:56:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5865}, 0x0) 15:56:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000006400)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r3, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0xec, r3, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa76}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x96a7}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7a72}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x66e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe4}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x40811}, 0xd7c1faeb5e13f374) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6000}, 0x0) [ 1537.690047][ T29] audit: type=1804 audit(1591890979.956:790): pid=16900 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1024/cgroup.controllers" dev="sda1" ino=16377 res=1 15:56:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x400c045) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6558}, 0x0) [ 1537.965687][ T29] audit: type=1804 audit(1591890980.226:791): pid=16943 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1025/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1538.080019][T16921] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:20 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000090000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8100}, 0x0) 15:56:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1100000000000000}, 0x0) [ 1538.134586][T16943] __nla_validate_parse: 6 callbacks suppressed [ 1538.134596][T16943] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1538.215689][T16921] device ipvlan879 entered promiscuous mode [ 1538.280589][T16926] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1538.340322][T16926] device ipvlan880 entered promiscuous mode 15:56:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ca0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xd102}, 0x0) 15:56:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1200000000000000}, 0x0) 15:56:20 executing program 0: r0 = socket(0x11, 0x5, 0x3) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf000}, 0x0) 15:56:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x34000}, 0x0) 15:56:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x400300}, 0x0) [ 1538.869957][ T29] audit: type=1804 audit(1591890981.126:792): pid=16946 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1025/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1538.895063][T16969] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1538.924597][T16969] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002a00) 15:56:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1206000000000000}, 0x0) 15:56:21 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000a0000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1538.959055][ T29] audit: type=1804 audit(1591890981.176:793): pid=16981 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1025/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1538.998451][T16968] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1539.106612][T16974] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 1539.155635][T16974] device ipvlan881 entered promiscuous mode 15:56:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1000000}, 0x0) [ 1539.301824][ T29] audit: type=1804 audit(1591890981.566:794): pid=17005 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1026/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1540.879322][T16971] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1540.888733][T16974] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1540.948554][T16974] device ipvlan882 entered promiscuous mode 15:56:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cb0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x1300000000000000}, 0x0) 15:56:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2000000}, 0x0) 15:56:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x7c, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x68, 0x1, [@m_tunnel_key={0x64, 0x2, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0x3, 0x4}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007", @ANYRESOCT=0x0, @ANYRES16=r0, @ANYRESOCT], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:56:23 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000b0000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:23 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)={0x3c, 0xd, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0xfffffffffffffe5b}]}, 0x3c}, 0x1, 0x0, 0x0, 0xed8f322dd9d9ad26}, 0x20000054) socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000050000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYRES32], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x14804) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x1000, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x20, r4, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00032ba97000fd070000"], 0x20}, 0x1, 0x0, 0x0, 0x24000000}, 0x400c044) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r1, 0x0) setsockopt$inet_int(r2, 0x0, 0x15, &(0x7f0000000300)=0x1, 0x4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYRESHEX=r5, @ANYRES64, @ANYRES16, @ANYRES16, @ANYRES16, @ANYBLOB="b09c6648fe8ccdfe11ee7c2ff2521c64e582e03a51f82b8be62bbb7f0feb5f3093510f3723dae102d48c78fdc7609fc81ccd03e157c69780263dabe30bec4ed781de0a7fcbb34f886c6ff2d17115aa26d1cfac30e4e8e1fc022d371c078a397eab3568a2f7732f4c0f9646e5f478f06c2cf1ecb1541bd972a7501b4b3cfc0515372355eba41415cfd9d0bb3295ef1fec40341f296bc8758b1c8dfe1b53261e24", @ANYBLOB="3dc0ae829b03092ee22d38aa0b833fe714d8b24d40fc2ea14660c0cdd1e2903a99335957067ec772a2e8cb0b45c2b2b3c55f25d699a0c90b770ad61314cfce67a2e88bbe5d2198d050d9a0f7e2e2e6512f98e541deab5353b4b5d4a924bd1bb9847bcee0241d8d7aa381c4748802aee1c64bbcefd9e94ae56bed4c9a1406ebaf4bec10318a08afadcec5004400"/165, @ANYBLOB="b1d4cc9436c129e965c17f24b552561ed748e6d2a22ec674f54b074c6f140f500097294bfa5f02889c843a15071c7c644dcbeb75fb825035b00686f265079c19ed9b28dff79db002370d0acea516c40486a49bf2a1d6b8f6f4551a6123d1360c2e38d3931e657c42a23ada6bfed070558b23386661c628ee915101b89934ef3d5c17ea9795a82d6b6f7410494a7524d31523c0ba06c68515f5db72b140bcae663d16b8ec1bac7fa5adf506135c50412dcc1b1b122aacb3a5b4f3a0", @ANYRESDEC]}, 0x1, 0x0, 0x0, 0x22004010}, 0x20085) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000480)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xfffffffffffffe3d, &(0x7f0000000440)={&(0x7f0000000b40)={0x14, r5, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX, @NL80211_ATTR_AKM_SUITES={0x0, 0x4c, [0xfac0f, 0xfac04, 0xfac02]}, @NL80211_ATTR_IE={0x0, 0x2a, "a4518897dd1fd269add44aa6fb4cd0dabae51453e4291842d1360ebc71bf43fe4c08c1cc0118c618f8b4421580944ff650b20d78d3455ec8914dc1e9a7adde694f709c3e176db4f61e05029e9126a10936a8af54212e939bad1144628c8fb773e5675c8fbffa8e21c9e37029ee5fd27b12d949b5e3a2b1324c5de438b9fcfe940bf560e1613b3ca76bb69ac29f102f00597a0cc912bafb11ed4d4a3e7e932bcd6c798d5c643efbed851191e96686f969f4a134a884bd0f90e356e0863d73c4b8cea815bd655a72259a8d31f88c056a2f3e20f471197a95fc268ddc5ad3b1d01408d03d13c5ea692234c3b69202bf1baa11d519b25703cab0529cba54cbbbfafdd4a58d194a77759b2e72be1a0c0e35a43d0978583a3332cfc4e7df77e89ec2a7811e3c7bc2636d8bacd344e42b7137927daf9ac355789518260841039f6f4a0ea14c4fde60912e363d1aa5a17d50fa50183eb8aeb1148a69237122719b5e781a32e72e840be16079e2cd682199428a91750027d0c2ed82f1ed2664f01e1827d27b9dfe2fc3bb8cd4d10b892912eb0e78a78b1e7007216ad570cc42d735621d9f2cbfff7a12e9d89a2797100df46b4bcb26a6f56f7dd0555cb52823bfe35f7bcfdfe23bac7d184456ab913bff8a3c4e26937ba1e0f740deab704891af79c9783ee9db6cced76d71ce0891b65d3ed2b2845e5e80bfe14f1619da307b1df157c85627d5288bf61860b13ae6fe0c180d2abb05cb7dadf59f706d59a309eb1a721c3f0dc6f4da7204bf3caecb1f9756e4c042652acf9c1f81815dddaedd3c21a6d3ef3748d3bc11bef4794f5a9577972937c31686b2e69555385f45787c800541949ea2a1d696ce847e383d6d171dbe6b393200473b12ae232432aff08ad9e0dd41d69937cc28e989067aa52f3be5846d0e77858815d17422841d2293f431d7f1555de944c935debb1888da726ad4fed76b5347dc1320a9a68585ac6cfa9c9cabdf31328335b46a0bf21e402652121fb6da8da828971f4f2f4a90b390caf4fc88d0591cf35c031b33e84a620a0b31bfa8cad1b9f5a47f88d37f5e1b53d035f16a9f1ffeebbbe5fddc3d9b2b6b1ae1a3eac0bcf85b7eac4905a944081a6c3c7fdcc5f8641a88e20868c50bfa8a9c95f084a25b6001370e540801e6ca8b26f34927f9c913a33e958688a3b6219440e0fc3c51e4c451fa2abfdb6f471609ae613392260b69a4a0fc5e0bf067d10492888f3ae6d1a81af911c90053421f1de5ffbc8113ba503cc2fe761cafd005f4d5b54a1770be8633fa22a07ea22d83e633da54cf7bb0c3d4667662a258c138c7347182d1426d9ca1f37b4a68253bf9fce4053376f29d3b75601f02091f6753148d94df273c54315953f8a2edfcdf44a516712b4689562ba7575bdbdb031b9b3db9dde00a0078e43a64632486095816a4e24093dd47f691b970b669616ea7f62c60c4a03c35c6c6f35b38b65239f2c44f2bfd411fba9f9f3408fbc48d5c55d6431af678ce03597405fa8023e61435538c3a155f69c38c36cccf0e7bc6d60a7881e864c5fcab572793621fe59da27ee69cb13137c49379b9eddcf1431f8ca92d1516c76e5d4d2bd6e651969bce784a0bdbefacfbab79f3979df56c15893c020e3fb5"}, @NL80211_ATTR_WIPHY_FREQ={0x0, 0x26, 0x20}, @NL80211_ATTR_PROBE_RESP={0x0, 0x91, "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"}, @NL80211_ATTR_ACL_POLICY, @NL80211_ATTR_DTIM_PERIOD]}, 0x14}, 0x1, 0x0, 0x0, 0x24008040}, 0x60000040) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@ipv6_getmulticast={0x14, 0x3a, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 15:56:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2040000}, 0x0) 15:56:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x3f00000000000000}, 0x0) [ 1541.350679][ T29] audit: type=1804 audit(1591890983.616:795): pid=17032 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1027/cgroup.controllers" dev="sda1" ino=16370 res=1 [ 1541.480320][T17029] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1541.498821][T17029] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x3000000}, 0x0) [ 1541.528441][T17033] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1541.567010][T17033] device ipvlan883 entered promiscuous mode 15:56:23 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000c0000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@default, @bcast, @rose, @netrom, @bcast, @remote, @default, @bcast]}, &(0x7f0000000100)=0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) ioctl$TUNSETQUEUE(r0, 0x400454d1, 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r2) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) sendmsg$sock(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)="0eaa669ff2a65517e3197c54275afd4d975bfcf666e8d464e419155bfc4872b1222803c0a48212e21707335199a088a09173440619181483bf58d6c4db7c3bd519b1c823efd04bffd3db1afbc29dc9c8aeb17b4543f56a839836b943f8b1388f1aae5b029968e8f299d2a0d410984fe3735f757ce52fe44d44cb32d85a155bda1ac45fcfb1a495ffb0", 0x89}, {&(0x7f0000000200)="93ffe130351f6f71cd1c7c97fcbd0dc5f0aadfe6d365bfb7c34c82ea34de01aaefb204399ee8c8a8b83e5fae60b8313461cd10cd52c9e28b8c5b0ad597ca5591c375741b7832d99f1250042658f24ddcf8a72c12e3095ed3af6cf403cfa5ca8ea3357082b47637eb17e63aa35681a22762fca90bdea69df1db2b2369539c22cd3ddcd9a004fe11d2b1f2903764aa9149603e8d4c1e79ac1783dea92fe5c25c7531", 0xa1}, {&(0x7f00000002c0)="e12c0982c26f892a58666e47bc7ef852c089764b7f35cf2616c823501dbc865e9e31b6fc840349ff86d18b63642eb370d41c9d749d28acfe11698ecc1df45cb66e050f3bf2fa012b4e2099ac3f66742b4c48b201417445f850c6bd3f4d945324e704c67e89d739e030414f52111a411f60f4501804f3391e4a96c35c9dab27709816d053be6ec7635f61d204776f12f1ff2fff720c16b14efed4ce87549b303c552a85796e5b00a4c51cc2c106582158dd90565a0a1c023e279bff8f241f535910ce1f1eb8a6b945cc15ef0aceaab00eda67a208f1ca94291aba485125da39919d5780449b71b83d2fec35e3e513a029", 0xf0}, {&(0x7f00000003c0)="3f3e505d0aabb7e9abe32ca22a9851e80be12869b16ea4007c851b73", 0x1c}, {&(0x7f0000000400)="d0ea0759f99ea054c5dcadb3f146ef08a6d23ea21ed3ec7bbe4a600d46950905d0a8a2da1a2d190325b3be617c4bccd112045c728c901727c58a148fa57edf71c6b4bd05dc19338171334dc806059f904ecb1955f80451268a99bb896a6dd6b027b64fd5d60cbb4a3d11f0dae3efd0db3a940e6f77d15403d9bc0dd53a41", 0x7e}, {&(0x7f0000000480)="69bba76161350035e29cc653865175abe4a1f163f61a30ac28", 0x19}, {&(0x7f00000004c0)="4b00b4fa361d035bb0f9eebd55c1e88856784c02247786b3fefc3461f039040526becf85e36b3b90ee23cdc0dfbcd3e34ef7a30f5b475078f5e24ceea91f36a78b5b7fe30d9fa5475008847df8585a2f185b85a92f904277b5fdf993e152103f8534f7249878d52c38563932a3b1f69e27bcd36ae7d1", 0x76}, {&(0x7f0000000540)="20437b28d856becfed8cfa82fd610b716f0f48fb2639ad4a931bd8819a33127fd7aa4c85f14bae9bc479e895e305a17153739cf756467f86aae9f4892347303580a1c92eb1451bc78e15dcce00e97c", 0x4f}], 0x8}, 0x80) [ 1541.701104][T17029] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6000000000000000}, 0x0) [ 1541.743158][T17029] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1542.053479][T17034] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1542.085011][T17034] device ipvlan884 entered promiscuous mode 15:56:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cc0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = accept4(r0, &(0x7f0000000200)=@nfc, &(0x7f0000000040)=0x80, 0x80000) recvfrom$l2tp6(r1, &(0x7f0000000280)=""/167, 0xa7, 0x40010002, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x20) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:56:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="6400000030003dfa00000000000000000000000050000100340001000f00010074756e6e656c5f6b657900003400028014000b000e0000000000000000000000000000001c0002000010000000000000000000000000000000000000010000000400060000000700000000000000000000000800000000000000000071d79b95517e5607ddd1150d0b4896837b70228de7b18d48387d57728c70e986ee8b9f95aee6053dd4e5710d59b0a4b1605765f3ddc4f986e6112c54185796c81fa3a2416440bac8aeedd32c595030a71b9668b78fa1f4f11e321167b53a96abd85960ffb26721569e3edeb34b3ad6439c6585721598813a6e4469511c0778b8d1"], 0x64}}, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000240)) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000002c0)={0x29}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x10001, @ipv4={[], [], @empty}, 0x69}, 0x1c) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r4) r5 = accept4$x25(r4, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x0) sendmmsg(r5, &(0x7f00000006c0)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @dev={[], 0x28}, 'ipvlan1\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)="eb4b82347d3debd749b410679e2c2fd5f5c17749094da1ab0a2f1be29f8e12a263b6de0be867aecb4f7deeaf578c35e314ba8d9bdc5eb6c5d92de03bf30367ec784cba117d64ee935ac6d250b6fd6f15418b79f91b7af7b5ac11b563ab5b419c62b06d447acf254551ed9bcd3ace98f1a9ab52b0018a53e7245ffb", 0x7b}], 0x1, &(0x7f0000000480)=[{0x50, 0x114, 0x8, "427a0c3d7b4d2e2748918e52d7e162d36a8a65412923f644db0d0774312bda8df241da610bcb7b7d3dcad6b0a7042a33c9e402df00fd078d0d01"}, {0xd0, 0x111, 0x4, "f0e6fecd299ab8e7d7707862e4014acbc332e49a8c5a65f1341510a72a98f32eb78bfe628083f80c17b19fbe0b9e68bda60cd5eec3259d31c1ee6d6c6800b4ca97e3f97af4dac824f95903db8d199732810e34246d266573de5ab8a5c1f3758edc8469d8a304ef7af5c8b7b493a4f0cf6578ef2ee8cd81bbaf504b44fc510f25b44eeb7c0dbafb3dfa1892f184ee5b69384ecc98ea8c2bc57d12cca816c8ab301973f9850ee48fa579a088f047269968b45b01f964ce2f70ca44"}, {0xe0, 0x104, 0x34d, "3b3daef3d3a22a12f3ccd9bf411e908fb9827689bc6382243f2fa50ab181c5b1415783dd9a85f312d128570f7186f7afed9ea7439474ee1e8486ce7d8a8b5fd73ccdff859cd97baa4f452332ea53596e7d024a9e6c471158b537b0b47e7df1b8566a9ef5d6370fe9496f0e3589ea32be6459e3925afd280bd1ae903f32f7e9366b244529897397e9b8ec1d6ae67ff3dccbaa62bbafff8b5c9cf66d2bf9ab9d47067baf7a3aa139e1610a480f547cca34be44c81cffcf587cc0cf3a8e330886486c073184c981e72958dac5"}, {0x38, 0x10a, 0x100, "99669954306b26fd2e8e7b5c1eb50fc594fbad0723501244c8a35f073c644efeec72969597"}], 0x238}}], 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @hyper}, 0x10) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 15:56:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x4000000}, 0x0) 15:56:24 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000e0000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x6558000000000000}, 0x0) [ 1542.390036][T17075] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x8100000000000000}, 0x0) [ 1542.466906][ T29] audit: type=1804 audit(1591890984.726:796): pid=17073 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1028/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1542.476391][T17076] IPVS: ftp: loaded support on port[0] = 21 15:56:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5000000}, 0x0) 15:56:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6000000}, 0x0) 15:56:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8000000}, 0x0) 15:56:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x9000000}, 0x0) 15:56:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa000000}, 0x0) [ 1543.509704][T17075] IPVS: ftp: loaded support on port[0] = 21 [ 1543.639442][ T29] audit: type=1804 audit(1591890985.896:797): pid=17078 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1028/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1543.684272][ T29] audit: type=1804 audit(1591890985.896:798): pid=17099 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1028/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1544.379221][T17074] __nla_validate_parse: 2 callbacks suppressed [ 1544.379233][T17074] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1544.409040][T17074] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1544.429955][T17079] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1544.450707][T17079] device ipvlan885 entered promiscuous mode [ 1544.512754][T17081] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1544.527186][T17081] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1544.605133][T17095] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1544.616869][T17095] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1544.639168][T17097] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1544.700145][T17097] device ipvlan886 entered promiscuous mode 15:56:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cd0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb000000}, 0x0) [ 1545.639128][T17124] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1545.648518][T17124] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1545.704810][T17125] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1545.722258][T17125] device ipvlan887 entered promiscuous mode [ 1545.736306][T17128] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1545.746020][T17128] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1545.803088][T17125] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1545.825879][T17125] device ipvlan888 entered promiscuous mode 15:56:34 executing program 0: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @ipv4={[], [], @local}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @mcast2={0xff, 0x2, [0x60], 0x2}, @loopback={0xff00000000000000}}}}}}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000340)=0x2, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r2, 0x1, 0x0, 0x0, {0x17}}, 0x14}}, 0x0) r4 = socket$inet6(0xa, 0xa, 0x7) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0x5a0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000280)=0x40) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00022abd7000fcdb00001000137564703a69f0bb048b88c7752dca72448019b73000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r5, 0x100, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x8800) 15:56:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="ef5316664f97b25006c780000000000010000b000500010007"], 0x1}}, 0x11) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r2 = gettid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000058c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0b3e0000000000000000250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=r2, @ANYBLOB="4c6f236cccbf9d84be857db5492b1bdb000fdc924b8326103c20c69a755a8157db2022450532df922feb8583ac43e6b1fa97ea818d41ed9693eb3c5fdd793b46a40832e5d6e049ee213d97574163943d54d386aeafd3d6f83e1f8d63b0a351fe704d3d3d0120847b6f606ebc7354d26d178989a8743c4269d389ed94b5b6d8b40d8d2a52af3b0b59626e8f64aa703f23cd8102e6623088b6b98582c8133440ef3c2dcf96277063f5e6f277be71b41e8bbdb32514832e641c2f09502babd6"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r8 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r7, 0x536ae464467e3e0b, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}]}, 0x3c}}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x80000}, 0xc, &(0x7f0000005800)=[{&(0x7f0000000200)={0xf8, 0x3f, 0x4, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x8, 0x0, 0x0, @pid}, @typed={0x8, 0x146, 0x0, 0x0, @u32=0x3}, @typed={0x4, 0x29}, @typed={0xd4, 0x5, 0x0, 0x0, @binary="9f83588cedbffd31f9c54d867d4130e86460c193fbfe49f6217b92933f574262f0e84f3db0a91a75bc1d9363f60a5f44974e2731343f742e83f4b38cb043c10c1193b239fcd22f133edecf3a5840274c52f148f0260e6625329e858421c1e94175d08c1e6fe315effe0e9c7b8caa340932721141e397da658954f8265d99768bd740f98862bdabae599f956f3124778061f1a99b1ecaac5fe59c3dd8bcfed333482ac8b28f1319ab9038b2c25a5b0da9c85f2515b8c17945fb697c46942fb0e57acbef8359b4506ec8aac36517cc56e2"}]}, 0xf8}, {&(0x7f0000000300)={0x130, 0x24, 0x4, 0x70bd29, 0x25dfdbfc, "", [@nested={0x11e, 0x77, 0x0, 0x1, [@typed={0xc, 0x56, 0x0, 0x0, @u64=0x1f}, @typed={0x8, 0x4c, 0x0, 0x0, @pid}, @typed={0x4, 0x61}, @typed={0x8, 0x15, 0x0, 0x0, @pid}, @generic="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"]}]}, 0x130}, {&(0x7f0000001b40)={0x12b4, 0x19, 0x10, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x10, 0x40, 0x0, 0x0, @str=':-.2-)\x95][*(\x00'}, @typed={0x4, 0x54}, @typed={0x17, 0x53, 0x0, 0x0, @str='cgroup.controllers\x00'}, @nested={0x1c, 0x2f, 0x0, 0x1, [@typed={0x8, 0x33, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x5d, 0x0, 0x0, @u32=0x400}, @typed={0x8, 0x6d, 0x0, 0x0, @u32=0x9}]}, @nested={0x187, 0x6a, 0x0, 0x1, [@generic="45e1ad", @typed={0x8, 0x82, 0x0, 0x0, @uid}, @typed={0x8, 0x56, 0x0, 0x0, @pid=r2}, @generic="50e0abed5acea03c1f4636c9663fae053c50a5903fd99e2f745aee3d8c083e81b95f5a717ff37a92ca64011e45daa50cad1b5cd9fd7c54437fee168eaf4e58f13bbaee2a5553f2d715157ed8f268a4c835df301da34ae7352532aa67b94ffab1a0586e895b4f2cc7c6adfed72a657ebef245857e90a5eb9783bb6ad73bf9c75a681c674d24cd781577013290d35fd52bcfd62a8b8a5f2465b7ca8b32d751be86087faeb3eae5dd3e2bc85d791f95927aa4b536b31fc5de72d7ee58623f63765d40ed4bf237094b8fc8a145a9", @generic="84eb786afb02b90772859271550187ff2a1692e667239e94e00486d84894e728979143f958da1d609931851c67d64311e0b3b28eb7613b", @generic="804b7e8d", @typed={0x4, 0x14}, @generic="2a060deb316526f9fb643b83f91c93a34bfacbf717ff9b623f8bbcd843bb9a5034a68554705b1712e43dbf6b93b16e1a8572de92f8f1889a596cb4f7b08c0dfc3970148d6e8aedba181603e6bca76c90946caedc8c7d16e0a45b72f2979c0ea23050c34c9f"]}, @generic="6d40fc4faff279beccbc3418586d24780ee5637aee92092750b76f9fa3fcf757333fe2158c9d79b24a7ac06b9439ef724d9932ac846aec2516ba42e8a86dc25ae2ed0e54d61ec58997d9be33f3e905d660c695e32fd0a41881deb12750202b46160347cbb6ea29521eefc46f6afae489ab443c0a3a6f2ce57eb2b0b188d76458d53623ba22ef1fcaf325c0815ccf9e05a41b2325e08e7e2f9a91caa6eb5fbcdc5f9696fd9e", @nested={0x102a, 0x33, 0x0, 0x1, [@generic="713c3815beec810d0e7f1ad529f2cca6152e89c414371a4a39547f7574c8459ac827fd0f5417", @generic="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"]}]}, 0x12b4}, {&(0x7f0000000740)={0xe4, 0x30, 0x100, 0x70bd2b, 0x25dfdbff, "", [@typed={0x8, 0x90, 0x0, 0x0, @pid}, @generic="4143c4949791dcf05d76e91a065d4bf208d398509ee7eda6791027be42bf9f6e3140deb72b1510d7bc9a75acc0e46789b54a0976a2fbeb3d9f0edaf0c3c649da02309dbf6eba30c87d39a93d592871e9cc1e83f67fa0d0069149b722e98990770350f973bd5a340b5856a00914c73bdab615246fac59f86a5abcc6062b55efd58990948d21e24886a120233cfcece7bc0675297c65c131062a90e1c8ac2d3ede4085d76cd9b818b3d73d59d619bd6fd2bb0780817beceb573978828f44889857b94e992038860fd1", @typed={0x4, 0xb}]}, 0xe4}, {&(0x7f0000000840)={0xf0, 0x40, 0x2, 0x70bd29, 0x25dfdbfb, "", [@typed={0x54, 0xb, 0x0, 0x0, @binary="76b69e49171570ece2d865866a6d0d5dffcd79ce51c0cd07a66a5fe763a3321d6131afb04029e40b96ca33f62708639e319105cd4e81e87bd85d77801e7ca87289d4cab29ab8691cb9b8fad426325ee7"}, @generic="5177e2817fedd84d39507fa429ae340f93f9521b8151b54c5bd8fcdd1036fd7edeaa7f4bc59a3f4976d6221dc8c56afb8d72e38f4319efbaef312c509c1e73c45ec5faca655347735d2732fdc04e41df678e144ff5efff4cc391b6ea237d9011db059e976687efe2ad7d164409dfc1a2709ab7df7cf9f9df5ee28e3d72dd7379afb7b5a962d0d8f42d3f02"]}, 0xf0}, {&(0x7f0000000940)=ANY=[@ANYRES16, @ANYRES32=r3, @ANYBLOB="8d5fc82731c99737e8011859e66938ff2540b3382060d2e0dbfe2879c60760dfb46395489d632ea7c54f90f1d51ebe178be9c2ca177253e2df5a2a3f9ea0f7dc8757380aa3cdfe8f4a7669edf3e66756c638196c84d24cd19be3cbf1d6a70b51121147461125ce32d97b75e0ecc058cb08ad8a9e439dcf6b1037f9558a1796535abf6f188e0c0fe7c003347b9345c95c188a97bf3980843ec7a0632014753b2dd571bca85bfbf3896e780c05449ed1e1cd8fbb800e83475cc919bb5367862151d081ec6cc70167295333ad4a741a3f5dbe2c14004800ff01000000000000000000000000000108007400", @ANYRES32=r4, @ANYBLOB="170006006367726f75702e636f6e74726f6c6c6572730000000071ea8b52392070d7b0a91078802173ccd05c21f821b94b973198428593214fe858af568e64425e9d468a1876077beba5bf64efd340d29c469008a79399725f7f9c73215a27b195960668b3428ce67f956d2061ca694b49497ce3009f0f2e4bf88c5b360af064a27e41d5e961493a9e920d824beb541204bcc3ce5084c91fc506d352d1cda24c3eb27628ebc911747b740775325108278567552f6e1beb622c91c2299e248e87f7986aea08007400", @ANYRES32=r5, @ANYBLOB="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"], 0x235c}, {&(0x7f0000002cc0)=ANY=[], 0x21f8}, {&(0x7f0000002e00)={0x828, 0x35, 0x0, 0x70bd27, 0x25dfdbff, "", [@nested={0x3cb, 0x70, 0x0, 0x1, [@typed={0xfe, 0x8f, 0x0, 0x0, @binary="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"}, @typed={0x4c, 0x2e, 0x0, 0x0, @binary="a4f596a89ed69f83b843210ec4e122494063b0baf9d304086130c7e5a25b1f63090f3d7e4c26a4b0f57c1270f02dd172d3d2e93fc6e91844441be091e1483b32c205e22d0691ed7f"}, @typed={0xc, 0x29, 0x0, 0x0, @u64}, @typed={0xc, 0x77, 0x0, 0x0, @u64=0x58b85bfb}, @generic="9670b34b00f156625a56ac46d5150ff9b9d5b5bd9cd83d13c319b6beccd941e8888fda520bf2578c3f45134faf8415c675adc803663ade52050a176e10d714e025b8a73c44cf6327c20b79b94b6de396b4eec1966cd50c4fb64f054572825e438f1d43997c58b59d85dce820b2085c2346f9eef468", @generic="a20a4f99238b7d0dcd5f17f68a039c792bd91ca5035ef37f52e281a4049c1fac4440b1a71d2d1eac044184463e77c100c50f49ef0ca159c8a8ff162aa2156065016358d8db937883612d0e35fb4746322b7d860a327feee0de0763e2260a7d41e0f3e64e302ada41f75797ba20bf3ae8f6cd688bfd151f1f356a31e48f7b1b045bb1b7b825d4734d1f46c44c4a111746211a2cd5ad992a2f5ff158ba4c47328d77e6d2864ad4ef647fad62505edffd6d7939f49a04701c8de07af02bee311947b99281d72826c414616c5688ef22389a8dd283a3cc1ac43b735a82d0e8abf7d96c", @generic="f5d06c1d8572471331d8bb97a804b776dc19f1883296c3e98b945f2b8dbae29a4b32b30757ad43e1356abc4ae81fcb72204cc3c01731ea32d74e66917992a4ee388658ea489d9b8f9e5e862cea08597be554284702cac6525444506b93b970fde4b2a7a1ad08daf1f98a3dce872814df7d44eb1b660bd5a425db270334", @generic="fd434aa82efbfdeba85ade8e7af13e35a292737e378e003690bf43f32b18db2d6d205f5f82e6252ab894837d3522965a1345377c5c5dc41072efc20cc3338a1c027f0cfe0248301fa4648b77a85777b3ce8506b16a62da69e24c5ea64c541d93d3c99612c08701958faac81380677f3dc771275ea9c461e533a8dabf03063968b2128f5bac27a683c13e0d522f180ead"]}, @typed={0x8, 0x3ff7, 0x0, 0x0, @u32=0x7}, @nested={0x1eb, 0x55, 0x0, 0x1, [@typed={0x14, 0x7a, 0x0, 0x0, @ipv6=@empty}, @generic="4a352ce878be6d2e013b75299df24cf05b1c1c0cd909330865aaae3c7cef4eccfe4397b765466442aa0ae1d6487bda220541d5ee9a9cfd43c00b6be0d9d7c2386afb51b87b7d025fa7c25553dd50a58ceff1c29c8aaf9f0287c70623cf2c995b62c13e77c0bbd53ead52bf08027507e8cec6e9075f9810c74018f984e18dfa72ed8cc999aa6b92c058b821ed89493ebc9bf15feb05652b572a22a66b6a8fa6a7dea8c7fe09011dfa291c355573b4e01ba8f2e9cc7df26c9010abaf24c4381fa5113abf46a46d10abf64aeffcd92fdbe702dc41ef4d05e2f2caf4cb", @typed={0x8, 0x4a, 0x0, 0x0, @u32=0x187e0}, @generic="e306d1bbdef3c7e706db960c15fe880ee717e0e7c4c493a0f57a49b187ef92519d973ef3457c121c1935c30420b0580aef9a24bf7a64ce053cc2949f7ef0992c3cc5343f5b4501a3d605cd63459d2f5b79659c8acb1eb162da7023dcf2dcbf8d7bdd0ce4055fbf3269bbc90db5fb819a734acfa651a8293fa9117be6d1e5c4642b28138025b157f8852458546a02325f395182866fa2fe5dfe4ace828c15b885e268ee2b4d71aded3940a526d772b534f7a81a3e31e70913e9a40197ccf1cde7659765d83ec94baf98ca17cfc4c3f44f53a8ce386af5c7e6bc975a42883621922b1c3caa4bd49279", @typed={0x8, 0x76, 0x0, 0x0, @ipv4=@empty}]}, @nested={0x256, 0x3f, 0x0, 0x1, [@generic="755a950ba8a0cd53ad4a94d8a45af60f71a042fb8f56d9f914e1f1757041c0c83aa17f201d64e02142564134652ae6efcbc94d282fefd60a356e902b162555b9482c9cde7e32ad7c5654ffa449e3842dbb69ea65afd9ad0e54cfe5813fde1247dc0b3a263f3d600df4f02c28a77eaf8b094142860d2982febe53c27372ec9a76689710398a0a527ee781adf66c78b6d9a82fa57f0fb89c80bc55ed12da3b00e6998ee60250d4b109b0215da8c4493a5127fe8c0937aeba6c0f616d4fe14d3b07516bb2a21d24249428e4465b9233ea48b71ca4687e839ab957b22f644cde660eda4337", @typed={0xc, 0x21, 0x0, 0x0, @u64}, @generic="6ddc209028bad638cd908b7e6c6af59cc682c808ab40b12f3ea3e1411f1ff6f1db49a813b150ce40566c866b1dc8e97e5195e74b43fa002303468aee2ddcaf0309d3cda0f3b603b8b548e869e2d636f70bd2f7a9a60f9abd35864ee1fe4b4d899a456b3faa548d809418b11634285793b1152338f2c132729bfb2f53b5156e2ea5e80e4a71e07af4a6c247426f87a6c9b83464d406ce9c95782d6f6403330d7d4a16be5ec058702ed774089123ada7dfb77af1d39aa6939fc92dc283243e85", @generic="b82c804df704270b78c8e7b96148e500797412d67537b014250fb004c36a5d3c1e190a7141cd80bfb4e261873629d73cbba7e0fc6d21e8cfc6f9e0a963d54ea9fec2d60383589416a6883ed6c9a8e88a117604dc9af2e1bf7957fb5ed685ad7231eccde3605640796228e68c30a1e82638a4ece12cb54232ae75b822aadb4945606c84469959a686b0d4c183673fc5f4af335998b0caac21f3cb5dea", @typed={0x6, 0x92, 0x0, 0x0, @str='[\x00'}]}]}, 0x828}, {&(0x7f0000005600)={0x108, 0x3b, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@nested={0xf0, 0x82, 0x0, 0x1, [@typed={0xe9, 0x2f, 0x0, 0x0, @binary="c2eb31769b00e1b23f2bc76c125e64a253b3052f727c885d818dc5cfc1b91be572b11009cdbd4a7dc365e690a859a8f575b3b214ba0b6ec78bcbe3becd37854961d1267dbc20ea8fcdbcdb239fc700deba845968e487e197eec557f91195f3d6a921ce6954dfe2fa3787585a1f1f7ec8cd92e63da515480e7862549a72e354bee82ee911e50a9e7bfaaa429a15332876944189307ecc4e0bb43ca17dead4512d0b1b510df1ad364731329fb0d44834fc07382fbb84806e42d41be685d7ed30d07d5b38a05f365287d48fc008a8118dc8c56f585b1bc86efbcf370001a506a2c34e54fd0ea8"}]}, @typed={0x8, 0x70, 0x0, 0x0, @fd=r0}, @generic]}, 0x108}, {&(0x7f0000005740)=ANY=[@ANYBLOB="b4000000110020002abd7000fedbdf25a30031800c003b00040000000000000008000a00", @ANYRES32=r8, @ANYBLOB="e93c4a9568f0a74920667fa03288aa78a2ff9ac8f6bdcf2189c74737febfa2516cc238cde12c8a1f6bd387d48ea318c6d9ae58efe2f8fdaa9571d25a80527dd1a006c965037bc3e48ef9637409a04c7979a5b2414e4c30c3401c0017dc6a2de9a60a27ff3bc3a42a40c4f1c02c89520eeee68a44a3866672eb68879cb888cfaca7f920d837ce3034aeaeeb00"], 0xb4}], 0xa, 0x0, 0x0, 0x4000000}, 0x40010) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r10, r9, 0x0, 0x1000009fd) 15:56:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x88a8ffff00000000}, 0x0) 15:56:34 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000000f0000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc000000}, 0x0) 15:56:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025ce0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe000000}, 0x0) 15:56:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x9effffff00000000}, 0x0) [ 1552.628829][T17139] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1552.638245][T17139] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:34 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000100000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1552.701966][T17148] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1552.772560][T17148] device ipvlan889 entered promiscuous mode 15:56:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf000000}, 0x0) [ 1552.836352][T17146] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1552.852389][ T29] audit: type=1804 audit(1591890995.117:799): pid=17167 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1029/cgroup.controllers" dev="sda1" ino=16113 res=1 [ 1552.858751][T17146] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x10000000}, 0x0) [ 1552.998602][T17150] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1553.022927][T17150] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1553.091052][T17139] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xb602000000000000}, 0x0) 15:56:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="6400000730003dfa00000000000000000000000050000100340001000f00010074756e6e656c5f6b657900003400028014000b000e000000000000000000000000a1d4c9a70000001c00020000000000000000000001000000000000000000000000000004000600000007000000000000000000e9ff08000000000000000000"], 0x64}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000000002010000", @ANYRES32=r4, @ANYBLOB="08000200ac1414aa"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r4, @ANYBLOB="0400c0b4a0e6000009000000aea80000200021001130e4bcbdd2b1d07d800312842600b0a7f34dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r4}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getqdisc={0x2c, 0x26, 0x828, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0xfff2, 0x8}, {0x7, 0xfff2}, {0xa, 0xc}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba002994d47cc8330000008544", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b"], 0x28}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 1553.197384][T17139] device ipvlan890 entered promiscuous mode [ 1553.315917][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 1553.324311][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 1553.332573][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 1553.340622][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready 15:56:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025cf0535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:35 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000110000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1553.442342][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 1553.470649][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready 15:56:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x11000000}, 0x0) 15:56:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x12000000}, 0x0) [ 1553.516391][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1553.568066][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1553.602930][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x12060000}, 0x0) [ 1553.814861][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan2: link becomes ready [ 1553.839776][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan3: link becomes ready [ 1553.917383][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan4: link becomes ready [ 1553.944675][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan5: link becomes ready 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x13000000}, 0x0) [ 1553.962090][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan6: link becomes ready [ 1553.993791][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan7: link becomes ready [ 1554.016882][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan8: link becomes ready [ 1554.041630][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan9: link becomes ready 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x60000000}, 0x0) [ 1554.127470][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan10: link becomes ready [ 1554.170801][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan11: link becomes ready [ 1554.192407][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan12: link becomes ready [ 1554.233805][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan13: link becomes ready [ 1554.266712][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan14: link becomes ready 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x65580000}, 0x0) [ 1554.351301][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan15: link becomes ready [ 1554.359382][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan16: link becomes ready [ 1554.367396][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan17: link becomes ready [ 1554.375460][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan18: link becomes ready [ 1554.383546][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan19: link becomes ready [ 1554.433633][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan20: link becomes ready [ 1554.447430][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan21: link becomes ready [ 1554.455543][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan22: link becomes ready [ 1554.465160][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan23: link becomes ready [ 1554.483669][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan24: link becomes ready 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x81000000}, 0x0) [ 1554.538998][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan25: link becomes ready [ 1554.546934][T17186] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan26: link becomes ready 15:56:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xf0ffffff00000000}, 0x0) 15:56:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x88a8ffff}, 0x0) [ 1555.858597][T17195] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1555.867929][T17195] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1555.886070][T17197] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1556.001894][T17197] device ipvlan891 entered promiscuous mode [ 1556.063783][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 1556.077347][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 1556.150476][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 1556.182035][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 1556.214605][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 1556.249389][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 1556.290878][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1556.361479][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1556.400370][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1556.462676][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan2: link becomes ready [ 1556.523221][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan3: link becomes ready [ 1556.547768][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan4: link becomes ready [ 1556.572438][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan5: link becomes ready [ 1556.609186][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan6: link becomes ready [ 1556.616861][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan7: link becomes ready [ 1556.699828][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan8: link becomes ready [ 1556.707559][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan9: link becomes ready [ 1556.748873][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan10: link becomes ready [ 1556.756702][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan11: link becomes ready [ 1556.839775][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan12: link becomes ready [ 1556.847673][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan13: link becomes ready [ 1556.861818][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan14: link becomes ready [ 1556.871993][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan15: link becomes ready [ 1556.881251][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan16: link becomes ready [ 1556.890249][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan17: link becomes ready [ 1556.898316][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan18: link becomes ready [ 1556.907780][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan19: link becomes ready [ 1556.917287][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan20: link becomes ready [ 1556.926345][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan21: link becomes ready [ 1556.935428][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan22: link becomes ready [ 1556.945954][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan23: link becomes ready [ 1556.962773][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan24: link becomes ready [ 1556.974983][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan25: link becomes ready [ 1556.984049][T17190] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan26: link becomes ready [ 1556.993835][T17216] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1557.009441][T17216] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1557.030974][T17219] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:39 executing program 0: pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000002380)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002340)={&(0x7f00000022c0)=ANY=[@ANYBLOB='P\x00:w', @ANYRES16=r2, @ANYBLOB="00042dbd7000fcdbdf25030000000500050000000000040004000800030000020000080003000180ffff0800020007000000050006000800000008000200030000000800020000030000"], 0x50}, 0x1, 0x0, 0x0, 0x80408c5}, 0x44) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x90c, @mcast1}, 0x1c) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}, 0x1c) [ 1557.055297][T17219] device ipvlan892 entered promiscuous mode 15:56:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d00535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x9effffff}, 0x0) 15:56:39 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000120000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), 0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004077d0301"], 0x1}}, 0x1800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000200)="24bb0ecef0f41c7abaf76522fbd349912796fd1e912d7ece98b64c924f84b120b454eb7c4e0f8e2d4e9c6d6042a25710ce7187f332e9dd68f29a4ef5e34dd8e5dfe20fb402b40c300291d921ac5453a45674be9a04f41bf676f30dccddffd6a92896697e18cb6bb12778f932eaa8290e63ffdb051ba57db5ece98dab45ef12eb8615486517078b7a8a586ac563804dfd330943c19bdd490c9083fd8d1bf2a45445ce98be3fc5661b7a", 0xa9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002a00) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000100)={0x6, 0x0}, 0x8) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180)={0x5, r5}, 0x8) 15:56:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffff7f00000000}, 0x0) 15:56:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xffffffff00000000}, 0x0) [ 1557.273778][T17246] IPVS: ftp: loaded support on port[0] = 21 15:56:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xd1020000}, 0x0) [ 1557.438301][ T29] audit: type=1804 audit(1591890999.697:800): pid=17249 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1030/cgroup.controllers" dev="sda1" ino=16381 res=1 15:56:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0ffffff}, 0x0) 15:56:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xffffa888}, 0x0) 15:56:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xfffff000}, 0x0) [ 1558.176611][ T29] audit: type=1804 audit(1591891000.437:801): pid=17253 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1030/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 1558.222167][T17251] IPVS: ftp: loaded support on port[0] = 21 15:56:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1558.256804][ T29] audit: type=1800 audit(1591891000.497:802): pid=17253 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=16381 res=0 [ 1558.478424][T17252] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1558.487753][T17252] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1558.548423][T17259] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1558.590047][T17259] device ipvlan893 entered promiscuous mode [ 1558.713996][T17275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1558.731339][T17275] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1558.790581][T17281] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1558.819622][T17281] device ipvlan894 entered promiscuous mode 15:56:46 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000130000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xffffff9e}, 0x0) 15:56:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000200)="5afa7ba71bccb96ed07b7c55f66ad5c52206f6f3db90fe42903fc1a1b3045de495a5d100510af40858e6b996d1a21a456e4d091f6d12b4f0561e00b10473ef639d7685d16af16e4d4efdc0d7b3eb8474b073b6eedd6a6c0d04a7ae0332bfbbeecb0d9fa75c8d359e294cb6949acbba1e6a336c332a6a21fc856eccf428da98f343cd37e5d60f00", 0x87) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:56:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0xfffffffffffff000}, 0x0) 15:56:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d10535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000240)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r8, 0x31f, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x6c, r8, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1f, 0x3}}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x5}, {0x8, 0x0, 0x9}]}, @NL80211_ATTR_BSSID={0xa, 0xf5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x3, 0x1}}, @NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0xffffffffffffffff}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x20004800) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c8ad7c4238f3192fbb729253b033bf7780cfe0c61c22a3f", @ANYRESDEC=r5, @ANYRES64, @ANYRESDEC=r6, @ANYRES64], 0x30}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x11, 0x401, 0x0, 0x0, {0x2, 0x0, 0x504, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x20}}, 0x0) 15:56:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1563.806443][T17304] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1563.832548][T17304] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x40030000000000}, 0x0) [ 1564.026058][ T29] audit: type=1804 audit(1591891006.287:803): pid=17310 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1031/cgroup.controllers" dev="sda1" ino=16375 res=1 15:56:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2}, 0x0) [ 1564.138820][T17309] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1564.148444][T17310] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:56:46 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000600000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1564.199460][T17304] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1564.232914][T17304] device ipvlan895 entered promiscuous mode [ 1564.246187][T17311] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1564.309275][T17311] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1564.331366][T17320] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1564.345352][T17320] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 1564.509845][T17312] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1564.533290][T17312] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x3}, 0x0) 15:56:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 1564.558138][T17317] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:56:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x4}, 0x0) [ 1564.674452][T17317] device ipvlan896 entered promiscuous mode [ 1565.018285][ T29] audit: type=1804 audit(1591891007.277:804): pid=17318 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1031/cgroup.controllers" dev="sda1" ino=16375 res=1 15:56:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x200000000000000}, 0x0) 15:56:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025d20535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1565.158720][ T29] audit: type=1804 audit(1591891007.397:805): pid=17356 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1031/cgroup.controllers" dev="sda1" ino=16375 res=1 15:56:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5}, 0x0) [ 1567.122951][T17372] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1567.142582][T17372] device ipvlan897 entered promiscuous mode [ 1567.156970][T17377] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1567.175604][T17377] device ipvlan898 entered promiscuous mode 15:56:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a59a4df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) getsockopt$bt_hci(r2, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0x8d8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3}, {0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, 0x4, [0x6, 0x0, 0x9, 0x47cde63, 0x9, 0x6, 0x2, 0x1]}, 0x5c) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000001) 15:56:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=""/40, &(0x7f0000000100)=0x28) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x7c, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x68, 0x1, [@m_tunnel_key={0x64, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x200}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000200)={{0x2, 0x0, @descriptor="bd347367279434c6"}}) sendfile(r3, r2, 0x0, 0x100002a00) 15:56:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6}, 0x0) 15:56:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x204000000000000}, 0x0) 15:56:50 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000f00000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000635d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x300000000000000}, 0x0) 15:56:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8}, 0x0) [ 1568.553483][ T29] audit: type=1804 audit(1591891010.817:806): pid=17406 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/1017/cgroup.controllers" dev="sda1" ino=16368 res=1 [ 1568.658831][ T29] audit: type=1804 audit(1591891010.917:807): pid=17404 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1032/cgroup.controllers" dev="sda1" ino=16367 res=1 15:56:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x9}, 0x0) 15:56:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x400000000000000}, 0x0) 15:56:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa}, 0x0) 15:56:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb}, 0x0) [ 1568.969275][T17415] __nla_validate_parse: 9 callbacks suppressed [ 1568.969286][T17415] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1568.986102][T17405] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1569.009454][T17405] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1569.038248][T17407] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1569.061810][T17407] device ipvlan899 entered promiscuous mode [ 1569.143721][T17407] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1569.159792][T17407] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1569.174922][T17407] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1569.207358][T17407] device ipvlan900 entered promiscuous mode [ 1569.271647][ T29] audit: type=1804 audit(1591891011.537:808): pid=17404 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1032/cgroup.controllers" dev="sda1" ino=16367 res=1 [ 1569.384820][ T29] audit: type=1804 audit(1591891011.647:809): pid=17436 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/1017/cgroup.controllers" dev="sda1" ino=16368 res=1 [ 1569.413741][ T29] audit: type=1804 audit(1591891011.677:810): pid=17439 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir573716612/syzkaller.oU1AGf/1017/cgroup.controllers" dev="sda1" ino=16368 res=1 15:56:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x2b, 0x1, 0x0) listen(r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="6400000030003dfa00000000000000000000005c50000100340001000f00010074756e6e656c5f6b6579000134000206000000000e0000000000000000000000000000001c0002000000000000000000000000000000010000000000000000000400060000000700000000000000000000000800000000000000000001554cf753c3536d"], 0x64}}, 0x0) r3 = socket(0x2d, 0x4, 0x6) ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f0000000080)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}) r4 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) sendto$inet6(0xffffffffffffffff, &(0x7f00000010c0)="f44b1ec4939ac92879d374434f2276881160d810733cebf9775237062c30d82ebf9e49ce6a4357cbba72903a1eb2", 0x2e, 0x8002, &(0x7f0000001100)={0xa, 0x4e20, 0x5, @private2, 0x5f5c}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r4, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0x8000, 0xffffff28, 0x3, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x3ff, 0x5, 0x8000, 0x2, 0x80, 0x80000000, 0x7, 0x400, r5}, &(0x7f0000000180)=0x20) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000454ff0)={0x0, 0x2710}, 0x10) accept4(r1, 0x0, 0x0, 0x0) 15:56:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x500000000000000}, 0x0) 15:56:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000735d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc}, 0x0) [ 1569.548235][ T29] audit: type=1804 audit(1591891011.797:811): pid=17418 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1032/cgroup.controllers" dev="sda1" ino=16367 res=1 15:56:51 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000300000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$xdp(0x2c, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendfile(r3, r2, 0x0, 0x50000) [ 1569.651550][T17446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1569.683111][T17453] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1569.696839][T17446] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 15:56:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe}, 0x0) [ 1569.725139][T17453] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 1569.847712][ T29] audit: type=1804 audit(1591891012.107:812): pid=17464 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1033/cgroup.controllers" dev="sda1" ino=16382 res=1 15:56:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf}, 0x0) 15:56:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x800000000000000}, 0x0) 15:56:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x10}, 0x0) 15:56:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x900000000000000}, 0x0) [ 1570.663531][ T29] audit: type=1804 audit(1591891012.927:813): pid=17475 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1033/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 1571.784849][T17457] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1571.797021][T17457] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1571.847813][T17463] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1571.899072][T17463] device ipvlan901 entered promiscuous mode [ 1571.958134][T17469] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa00000000000000}, 0x0) 15:56:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x11}, 0x0) 15:56:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000935d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000500000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:56:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='macvtap0\x00') sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r3, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) getsockopt$inet6_buf(r3, 0x29, 0xd3, &(0x7f0000000340)=""/205, &(0x7f0000000100)=0xcd) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r2, 0x0, 0x100002a00) 15:56:54 executing program 0: unshare(0x40000000) recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x12060) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) sendmsg$nfc_llcp(r3, &(0x7f0000000540)={&(0x7f0000000000)={0x27, 0x1, 0x1, 0x7, 0xce, 0xa8, "6363c50082f4f3487d2bc377a68818886d59cf52495450fb12469531cf9d8ef23ba4b2f7bbed3a685e59bc6219b25f2a27f0d35ca4775962569b01c67af972", 0x6}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000280)="21ed67210855ebd4a885caec89451c4862b1f9fe6a3e6db41865a19c5af9c8f53858d3071744397e3c76b2d2749457e6", 0x30}, {&(0x7f0000000300)="a2fae44e98361b23f6f76baf6b4ac00cfcf3cbbef4708df8a1669edbb5fcf1168aa090332f690a8516dc8e1dc162aba2838ca4b7a0da34c4690c02f2a4a8c2660047df9518406ecbae047cb5c01cdd6e9a3f95e2fa7e94f2e0fe63256ddc153a9eb65224f9a51b62eb90e109b97a5df1fe027f4558906659229e8e12f356f99066db61a29a5da69c64ecc9e554c5dd34c4cd6795c75edfee7a9dc7f36993fa1a3af1fd07bc210a0bda3bb5dde9827dfb52707d158d07614acffc9ca82c5f2da9182131d0dbf45ec3dd6947f4af4c4f7223eaa7ebfb6bc01aaffe", 0xda}, {&(0x7f0000000480)="970353df754f8b0e561dc74552a7bf7e8a288de5f5cd6575a0d7db0366c3fb2b43c961311563640792d7a63528c6836d74de82b35521d5eae37f9a4f045af8e0aa1f9d2e2de808b463e7a74e75274eaecd2be662a96523cdf99283588b20dd4037eabc025b9c18f38bd4ab16a0122f237cd78105491649d8700b283d", 0x7c}], 0x3, &(0x7f0000000500)={0x28, 0x0, 0x98, "c8fe77ec0db19c99bcb0f36c8ff845926bea"}, 0x28, 0x20000800}, 0x4000) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000400ffffffff08000200e0"], 0x28}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="2000000014002101000000000000000002000000", @ANYRES32=r4, @ANYBLOB="08000200ac141403627be4209b0c914d8a46d7a52fdf00aa"], 0x20}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r5, @ANYBLOB="04000000090000000900000000000000200001001130e4bcf0debdd2b1d07d762412842600b0a7844dade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=@ipv4_deladdr={0x4c, 0x15, 0x400, 0x70bd2d, 0x25dfdbff, {0x2, 0x38, 0x20, 0x0, r5}, [@IFA_BROADCAST={0x8, 0x4, @rand_addr=0x64010101}, @IFA_LABEL={0x14, 0x3, 'syz_tun\x00'}, @IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x23}}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x105}]}, 0x4c}}, 0x2404c814) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}}, 0x18}}, 0x0) 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb00000000000000}, 0x0) 15:56:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x12}, 0x0) [ 1572.304602][T17516] IPVS: ftp: loaded support on port[0] = 21 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc00000000000000}, 0x0) [ 1572.356464][T17523] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 15:56:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x13}, 0x0) 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe00000000000000}, 0x0) 15:56:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x60}, 0x0) [ 1572.530937][ T29] audit: type=1804 audit(1591891014.788:814): pid=17538 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1034/cgroup.controllers" dev="sda1" ino=16370 res=1 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf00000000000000}, 0x0) 15:56:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0}, 0x0) [ 1573.064726][T17556] IPVS: ftp: loaded support on port[0] = 21 [ 1573.265641][ T29] audit: type=1804 audit(1591891015.528:815): pid=17561 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1034/cgroup.controllers" dev="sda1" ino=16370 res=1 [ 1573.907730][T17537] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1573.944970][T17537] device ipvlan902 entered promiscuous mode [ 1574.002623][T17563] __nla_validate_parse: 20 callbacks suppressed [ 1574.002634][T17563] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1574.027621][T17563] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1574.037118][T17565] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1574.049778][T17565] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1574.064873][T17542] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1574.079671][T17542] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:56:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000c35d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:56:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1000000000000000}, 0x0) 15:56:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x204}, 0x0) [ 1574.363919][T17587] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1574.387601][T17587] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1574.440577][T17587] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1574.479780][T17587] device ipvlan903 entered promiscuous mode [ 1574.543035][T17590] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1574.581529][T17590] device ipvlan904 entered promiscuous mode 15:57:02 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c000000100001040000008b0500000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007", @ANYRES32=r1], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) 15:57:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2b6}, 0x0) 15:57:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1100000000000000}, 0x0) 15:57:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000e35d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1580.240435][T17610] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1200000000000000}, 0x0) [ 1580.290167][T17610] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1580.307130][ T29] audit: type=1804 audit(1591891022.568:816): pid=17612 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1035/cgroup.controllers" dev="sda1" ino=15922 res=1 15:57:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x300}, 0x0) [ 1580.327972][T17605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 15:57:02 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 1580.370909][T17605] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 15:57:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x402}, 0x0) 15:57:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1206000000000000}, 0x0) 15:57:02 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1300000000000000}, 0x0) [ 1580.716944][T17616] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1580.752546][T17616] device ipvlan905 entered promiscuous mode 15:57:03 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000600000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1580.867473][T17616] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1580.877701][T17616] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1580.887325][T17617] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1580.909286][T17617] device ipvlan906 entered promiscuous mode [ 1581.167287][ T29] audit: type=1804 audit(1591891023.428:817): pid=17605 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1035/cgroup.controllers" dev="sda1" ino=15922 res=1 15:57:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000100)=0xc) sendfile(r2, r1, 0x0, 0x100002a00) 15:57:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x500}, 0x0) 15:57:03 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6000000000000000}, 0x0) 15:57:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025001f35d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1581.329344][ T29] audit: type=1804 audit(1591891023.468:818): pid=17645 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1035/cgroup.controllers" dev="sda1" ino=15922 res=1 [ 1581.381120][T17654] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 15:57:03 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x6, 0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000001180)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b00050001000701b154b5c434f786cd67ba72c78c8b2356f266512fded3c309db28a458cc7fb1f8f071156a6d774f933523367c3d9fa3190db26da04bea6cb22b1f8933aeb0eaa158e4a608300fe8f008c3619070c47679f1082e85ce5d03853a2605d9beea64b5a7de29b05f5ef99c7ef75e52a4544b24a8168cfdb607bf09cac86664616b837ccd38b1"], 0x1}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r3, @in={{0x2, 0x4e24, @multicast1}}, [0x81, 0x2, 0x401, 0x6, 0x8, 0x8000, 0x3fc00000000, 0x7, 0x24, 0x10001, 0x8, 0x0, 0x10001, 0x6, 0xb856]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={r4, 0x6}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x100002a00) [ 1581.489033][T17654] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x600}, 0x0) 15:57:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6558000000000000}, 0x0) 15:57:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8100000000000000}, 0x0) 15:57:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x612}, 0x0) [ 1582.510263][ T29] audit: type=1804 audit(1591891024.738:819): pid=17684 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1037/cgroup.controllers" dev="sda1" ino=16210 res=1 [ 1582.536848][ T29] audit: type=1804 audit(1591891024.738:820): pid=17687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1037/cgroup.controllers" dev="sda1" ino=16210 res=1 15:57:05 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000120600000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 15:57:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x900}, 0x0) 15:57:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0x400, 0x8, 0x0, 0x8}, &(0x7f0000000100)=0x14) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100002a00) [ 1583.635868][T17661] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1583.650303][T17661] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1583.662237][T17662] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1583.696357][T17662] device ipvlan907 entered promiscuous mode 15:57:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 1583.817137][T17694] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1583.872472][ T29] audit: type=1804 audit(1591891026.138:821): pid=17715 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1038/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1583.897358][T17673] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 15:57:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025002835d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:57:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xa00}, 0x0) 15:57:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xd102000000000000}, 0x0) 15:57:06 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000700000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb00}, 0x0) 15:57:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 15:57:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x10000}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8051) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xc00}, 0x0) 15:57:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 1584.669158][ T29] audit: type=1804 audit(1591891026.938:822): pid=17711 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1038/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1584.791059][T17739] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1584.846718][T17739] device ipvlan908 entered promiscuous mode [ 1584.867305][ T29] audit: type=1804 audit(1591891027.128:823): pid=17754 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1038/cgroup.controllers" dev="sda1" ino=16383 res=1 15:57:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x4010, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000010c0)={0x80, 0x1d, 0xfffd, 0xff0}, 0x8) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r3, @in={{0x2, 0x4e22, @loopback}}, 0x1, 0x9}, &(0x7f0000000040)=0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100002a00) 15:57:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xe00}, 0x0) [ 1584.956311][T17739] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1585.012494][T17739] device ipvlan909 entered promiscuous mode 15:57:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025003535d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:57:07 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, r7, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 15:57:07 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000900000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf00}, 0x0) [ 1585.151191][ T29] audit: type=1804 audit(1591891027.418:824): pid=17769 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1039/cgroup.controllers" dev="sda1" ino=15777 res=1 15:57:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 15:57:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1100}, 0x0) [ 1585.300685][T17781] netlink: 'syz-executor.3': attribute type 23 has an invalid length. 15:57:07 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x2c, 0x1402, 0x0, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 1585.413815][T17781] __nla_validate_parse: 7 callbacks suppressed [ 1585.413824][T17781] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1200}, 0x0) 15:57:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1206}, 0x0) [ 1586.026165][ T29] audit: type=1804 audit(1591891028.288:825): pid=17806 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1039/cgroup.controllers" dev="sda1" ino=15777 res=1 [ 1586.119980][ T29] audit: type=1800 audit(1591891028.288:826): pid=17806 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=15777 res=0 15:57:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1300}, 0x0) 15:57:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x3f00}, 0x0) [ 1587.483211][T17782] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1587.501614][T17782] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1587.522718][T17786] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1587.603911][T17786] device ipvlan910 entered promiscuous mode [ 1588.946582][T17810] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1588.967091][T17810] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1589.040081][T17794] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1589.142968][T17794] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025005b35d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:57:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5865}, 0x0) 15:57:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0x75, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1ff}, &(0x7f0000000100)=0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100002a00) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c0000001200000229bd7000ffdbdf25090106fc4e244e200000000807000000f400000007000020040000000000010000000000ffffffff", @ANYRES32=r5, @ANYBLOB="040000000900000009000000000000ea1f0001007f2e61aff0debd43b05b39c970b4942600e9a7846fade9b7902aecc7"], 0x6c}, 0x1, 0x0, 0x0, 0x2}, 0x20000001) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001d40)={0x75c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [{{0x8}, {0x114, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xfff9, 0x7, 0x3f, 0xfffffff0}, {0x4434, 0xf8, 0x1, 0x6f}]}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x6, 0x8c, 0x23, 0x9}, {0xc973, 0x10, 0x5, 0xfffffffd}, {0x0, 0x20, 0x2, 0x9}, {0x100, 0x9, 0x7, 0x3}]}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffffd}}}]}}, {{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7681f61c}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xfe}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x58, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0xffff, 0x20, 0x9, 0xffff}, {0x0, 0x2, 0x1, 0x1}, {0x80, 0xbb, 0x3f, 0x3}, {0x1, 0x0, 0xff, 0xf3c}]}}}]}}]}, 0x75c}, 0x1, 0x0, 0x0, 0x4000000}, 0x25) 15:57:11 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x2}, 0x0) 15:57:11 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x3}, 0x0) 15:57:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6000}, 0x0) 15:57:11 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 1589.649432][T17845] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1589.673846][T17849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1589.726420][ T29] audit: type=1804 audit(1591891031.978:827): pid=17841 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1040/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1589.739179][T17845] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1589.818610][T17849] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6558}, 0x0) [ 1589.983292][T17847] device vlan3 entered promiscuous mode [ 1590.167389][T17841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 15:57:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8100}, 0x0) 15:57:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xb602}, 0x0) [ 1590.576917][ T29] audit: type=1804 audit(1591891032.828:828): pid=17848 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1040/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1590.666701][ T29] audit: type=1804 audit(1591891032.878:829): pid=17851 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1040/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1591.066919][T17855] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1591.155306][T17855] device ipvlan911 entered promiscuous mode [ 1591.361525][T17860] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.405504][T17860] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.454888][T17881] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1591.532867][T17881] device ipvlan912 entered promiscuous mode [ 1591.660041][T17849] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1591.693765][T17849] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000235d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:57:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf000}, 0x0) 15:57:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 1592.240910][T17911] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1592.302496][T17911] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1592.351495][T17909] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1592.480988][T17909] device ipvlan913 entered promiscuous mode [ 1592.556162][T17911] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1592.585148][T17911] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1592.634126][T17912] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1592.761407][T17912] device ipvlan914 entered promiscuous mode [ 1593.675099][ T0] NOHZ: local_softirq_pending 08 15:57:16 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000b00000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES64=r5, @ANYRESDEC=r2, @ANYRESDEC=r4, @ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x20004081) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x100002a00) 15:57:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x5}, 0x0) 15:57:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x34000}, 0x0) 15:57:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000335d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1594.553060][T17927] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1594.615885][T17931] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.648102][T17927] netlink: 82990 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.722242][T17931] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.784697][T17934] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1594.849589][T17934] device ipvlan915 entered promiscuous mode [ 1594.974200][ T29] audit: type=1804 audit(1591891037.229:830): pid=17947 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1041/cgroup.controllers" dev="sda1" ino=16372 res=1 15:57:17 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x400300}, 0x0) 15:57:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x6}, 0x0) 15:57:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 1595.376307][ T29] audit: type=1804 audit(1591891037.629:831): pid=17946 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1041/cgroup.controllers" dev="sda1" ino=16372 res=1 15:57:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x1000000}, 0x0) 15:57:18 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000c00000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1595.787213][T17958] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 15:57:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x8}, 0x0) 15:57:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000000406010206c780000000000010000b000500010007"], 0x1}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002a00) [ 1595.994635][T17958] device ipvlan916 entered promiscuous mode 15:57:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2000000}, 0x0) [ 1596.082020][T17931] netlink: 'syz-executor.3': attribute type 23 has an invalid length. [ 1596.233658][ T29] audit: type=1804 audit(1591891038.489:832): pid=17980 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1042/cgroup.controllers" dev="sda1" ino=15786 res=1 15:57:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x9}, 0x0) 15:57:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x2040000}, 0x0) 15:57:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000435d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) [ 1597.851623][T18003] __nla_validate_parse: 12 callbacks suppressed [ 1597.851634][T18003] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1597.929143][T18003] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1597.968891][T18004] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1598.017637][T18004] device ipvlan917 entered promiscuous mode [ 1598.074937][T18004] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1598.103401][T18004] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1598.143266][T18007] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1598.201387][T18007] device ipvlan918 entered promiscuous mode 15:57:37 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x37cb1133) socket$inet(0x2, 0x3, 0x33) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1, @remote}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}], 0x1, 0x0) close(r3) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 15:57:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x17c, 0x30, 0x4, 0x0, 0x0, {}, [{0x168, 0x1, [@m_ctinfo={0x164, 0x15, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x8}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x5}, @TCA_CTINFO_ACT={0x18, 0x3, {0x5, 0x8, 0x6, 0x4, 0x2}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x6}]}, {0xee, 0x6, "d1f340ddaba5df3a8f812f03f60b0362c50c25ad904df9226a694f52fe41bef254576a94da59522894aa2e88c1b33b9d669cb4496e00a53f283e86a232b01914cfcbb076864c91fd6a85fc0911a3332550ecd84f30340f1611c5bfec4becde90d21efeab362c47884ed44ddbde778d9d86d2486c0fa435ccb48a3bd6835ce5073487deac706811e612e1cdc30ddc063341304deb63368c76539ceebf44f52e83d467b5bc644c5a9805fa2d97b1286bfbf589374c28642424f91cbafb344a70a71d990e5b33ae973858068f814d9cb1f454cf66de65a477dfd88c2c462ac7c7e49a38feb5148166a424a4"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x17c}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES64=r3], 0x1}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(r5, r4, 0x0, 0x100002a00) 15:57:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0xa}, 0x0) 15:57:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x3000000}, 0x0) 15:57:37 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000e00000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) 15:57:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000635d25a80648c63940d0424fc601600174002000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x50, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @empty={[0xe]}}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x4}}}]}]}, 0x64}}, 0x0) bind(r4, &(0x7f0000000100)=@phonet={0x23, 0x3, 0x5, 0x3f}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_MODE={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x48}}, 0x0) ioctl$SIOCSIFMTU(r2, 0x8914, &(0x7f0000001680)={'hsr0\x00', 0x1}) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) 15:57:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0xb}, 0x0) 15:57:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x4000000}, 0x0) [ 1616.018485][ T29] audit: type=1804 audit(1591891058.280:833): pid=18025 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir823963808/syzkaller.qgWByR/1043/cgroup.controllers" dev="sda1" ino=15797 res=1 15:57:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x5000000}, 0x0) 15:57:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x6000000}, 0x0) 15:57:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x8000000}, 0x0) [ 1616.955585][T18022] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1616.965091][T18022] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 15:57:39 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c00000010000104000000000f00000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010007090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1, @ANYBLOB], 0x5c}}, 0x0) [ 1617.045996][T18026] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1617.124397][T18026] device ipvlan919 entered promiscuous mode [ 1617.204842][T18021] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1617.229182][T18021] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1617.285674][T18045] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1617.395626][T18045] device ipvlan920 entered promiscuous mode [ 1675.588552][ T0] NOHZ: local_softirq_pending 08 [ 1763.258421][ T1145] INFO: task syz-executor.0:18028 blocked for more than 143 seconds. [ 1763.266533][ T1145] Not tainted 5.7.0-syzkaller #0 [ 1763.295602][ T1145] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1763.305362][ T1145] syz-executor.0 D24824 18028 6837 0x00004004 [ 1763.319892][ T1145] Call Trace: [ 1763.323229][ T1145] __schedule+0x8f3/0x1f90 [ 1763.327694][ T1145] ? __sched_text_start+0x8/0x8 [ 1763.343775][ T1145] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1763.354194][ T1145] schedule+0xd0/0x2a0 [ 1763.362787][ T1145] schedule_timeout+0x55b/0x850 [ 1763.367673][ T1145] ? usleep_range+0x160/0x160 [ 1763.377180][ T1145] ? wait_for_completion+0x162/0x270 [ 1763.387855][ T1145] ? mark_held_locks+0x9f/0xe0 [ 1763.404106][ T1145] ? _raw_spin_unlock_irq+0x1f/0x80 [ 1763.411573][ T1145] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1763.417610][ T1145] wait_for_completion+0x16a/0x270 [ 1763.435884][ T1145] ? __mutex_unlock_slowpath+0xe2/0x660 [ 1763.442638][ T1145] ? wait_for_completion_interruptible+0x2e0/0x2e0 [ 1763.457096][ T1145] ? flush_workqueue_prep_pwqs+0x298/0x4e0 [ 1763.463888][ T1145] ? check_flush_dependency+0x15b/0x400 [ 1763.477442][ T1145] flush_workqueue+0x403/0x14f0 [ 1763.483323][ T1145] ? call_rcu+0x360/0x7e0 [ 1763.487713][ T1145] ? pwq_unbound_release_workfn+0x2d0/0x2d0 [ 1763.505985][ T1145] ? rxrpc_discard_prealloc+0x1e1/0xf10 [ 1763.515969][ T1145] ? __sock_release+0x280/0x280 [ 1763.526404][ T1145] ? rxrpc_release+0x29d/0x5e0 [ 1763.534628][ T1145] rxrpc_release+0x29d/0x5e0 [ 1763.544978][ T1145] __sock_release+0xcd/0x280 [ 1763.553072][ T1145] sock_close+0x18/0x20 [ 1763.557262][ T1145] __fput+0x33e/0x880 [ 1763.567176][ T1145] task_work_run+0xf4/0x1b0 [ 1763.574934][ T1145] exit_to_usermode_loop+0x2fa/0x360 [ 1763.586803][ T1145] do_syscall_64+0x6b1/0x7d0 [ 1763.595012][ T1145] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1763.606502][ T1145] RIP: 0033:0x45ca69 [ 1763.613595][ T1145] Code: Bad RIP value. [ 1763.617681][ T1145] RSP: 002b:00007f9cff4c5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1763.634363][ T1145] RAX: 0000000000000000 RBX: 00000000004db040 RCX: 000000000045ca69 [ 1763.644365][ T1145] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1763.663487][ T1145] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1763.677076][ T1145] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1763.693109][ T1145] R13: 000000000000007d R14: 0000000000525eb2 R15: 00007f9cff4c66d4 [ 1763.703505][ T1145] [ 1763.703505][ T1145] Showing all locks held in the system: [ 1763.719410][ T1145] 1 lock held by khungtaskd/1145: [ 1763.724462][ T1145] #0: ffffffff899be040 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 1763.745772][ T1145] 1 lock held by in:imklog/6506: [ 1763.752886][ T1145] #0: ffff8880a7e5f370 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 1763.771477][ T1145] 6 locks held by kworker/0:16/10630: [ 1763.776897][ T1145] 1 lock held by syz-executor.0/18028: [ 1763.790770][ T1145] #0: ffff88804b060c90 (&sb->s_type->i_mutex_key#14){+.+.}-{3:3}, at: __sock_release+0x86/0x280 [ 1763.807048][ T1145] [ 1763.813769][ T1145] ============================================= [ 1763.813769][ T1145] [ 1763.827097][ T1145] NMI backtrace for cpu 1 [ 1763.831660][ T1145] CPU: 1 PID: 1145 Comm: khungtaskd Not tainted 5.7.0-syzkaller #0 [ 1763.839565][ T1145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.849748][ T1145] Call Trace: [ 1763.853053][ T1145] dump_stack+0x188/0x20d [ 1763.857447][ T1145] nmi_cpu_backtrace.cold+0x70/0xb1 [ 1763.862704][ T1145] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 1763.868356][ T1145] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 1763.874403][ T1145] watchdog+0xa8c/0x1010 [ 1763.878667][ T1145] ? reset_hung_task_detector+0x30/0x30 [ 1763.884286][ T1145] kthread+0x388/0x470 [ 1763.888369][ T1145] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1763.894184][ T1145] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1763.899919][ T1145] ret_from_fork+0x24/0x30 [ 1763.904728][ T1145] Sending NMI from CPU 1 to CPUs 0: [ 1763.911184][ C0] NMI backtrace for cpu 0 [ 1763.911190][ C0] CPU: 0 PID: 10630 Comm: kworker/0:16 Not tainted 5.7.0-syzkaller #0 [ 1763.911196][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.911199][ C0] Workqueue: events ipvlan_process_multicast [ 1763.911205][ C0] RIP: 0010:lock_is_held_type+0x175/0x360 [ 1763.911215][ C0] Code: 00 00 00 00 00 fc ff df 4c 8d ad d0 08 00 00 49 c1 ec 03 49 01 c4 8b 85 c8 08 00 00 85 c0 7f 27 e9 0c 01 00 00 41 0f b6 04 24 <41> 83 c7 01 84 c0 74 08 3c 03 0f 8e 63 01 00 00 44 3b bd c8 08 00 [ 1763.911218][ C0] RSP: 0018:ffffc90000007338 EFLAGS: 00000046 [ 1763.911225][ C0] RAX: 0000000000000000 RBX: ffffffff8a592ea8 RCX: ffffffff86d54a05 [ 1763.911230][ C0] RDX: 0000000000000000 RSI: ffffffff8a592ea8 RDI: ffff888089352b02 [ 1763.911234][ C0] RBP: ffff8880893521c0 R08: ffff8880893521c0 R09: ffffc900000075e8 [ 1763.911238][ C0] R10: ffff8880ae638c1b R11: ffffed1015cc7183 R12: ffffed101126a551 [ 1763.911243][ C0] R13: ffff888089352a90 R14: ffff888089352ae0 R15: 0000000000000002 [ 1763.911248][ C0] FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1763.911252][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1763.911256][ C0] CR2: 00007f4e297f5ab4 CR3: 0000000093dcb000 CR4: 00000000001406f0 [ 1763.911261][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1763.911265][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1763.911268][ C0] Call Trace: [ 1763.911270][ C0] [ 1763.911273][ C0] lockdep_rtnl_is_held+0x17/0x30 [ 1763.911276][ C0] find_match+0x2d0/0xc90 [ 1763.911279][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 1763.911282][ C0] __find_rr_leaf+0x137/0x980 [ 1763.911286][ C0] ? __ip6_route_redirect+0xae0/0xae0 [ 1763.911289][ C0] ? debug_smp_processor_id+0x2f/0x185 [ 1763.911293][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 1763.911296][ C0] ? rcu_read_lock_held_common+0xa0/0xa0 [ 1763.911299][ C0] fib6_table_lookup+0x629/0xcc0 [ 1763.911302][ C0] ? rt6_age_exceptions+0x110/0x110 [ 1763.911306][ C0] ? rcu_read_lock_held_common+0xa0/0xa0 [ 1763.911309][ C0] ip6_pol_route+0x1c9/0xc20 [ 1763.911317][ C0] ? ip6_pol_route_lookup+0x13a0/0x13a0 [ 1763.911320][ C0] ? ip6_pol_route+0xc20/0xc20 [ 1763.911324][ C0] fib6_rule_action+0x2d6/0xae0 [ 1763.911327][ C0] ? fib6_rule_saddr.part.0+0x300/0x300 [ 1763.911330][ C0] ? lock_acquire+0x1f2/0x8f0 [ 1763.911333][ C0] ? l3mdev_fib_table_rcu+0x190/0x190 [ 1763.911336][ C0] ? fib6_rule_match+0x1f5/0x810 [ 1763.911339][ C0] fib_rules_lookup+0x3a4/0xc30 [ 1763.911343][ C0] ? fib_nl2rule.isra.0+0x1e90/0x1e90 [ 1763.911346][ C0] ? save_stack+0x32/0x40 [ 1763.911349][ C0] fib6_rule_lookup+0x375/0x750 [ 1763.911352][ C0] ? ip6_pol_route+0xc20/0xc20 [ 1763.911355][ C0] ? fib6_lookup+0x2d0/0x2d0 [ 1763.911358][ C0] ? ip6t_do_table+0xb35/0x1920 [ 1763.911361][ C0] ? ip6t_do_table+0xb8e/0x1920 [ 1763.911364][ C0] ? ip6_pol_route+0xc20/0xc20 [ 1763.911367][ C0] ? __ipv6_addr_type+0x20d/0x32a [ 1763.911370][ C0] ip6_route_input+0x5f0/0xa40 [ 1763.911374][ C0] ? ip6_route_check_nh+0x670/0x670 [ 1763.911377][ C0] ? nf_nat_ipv6_fn+0xfc/0x2d0 [ 1763.911380][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 1763.911384][ C0] ? rcu_read_lock_held_common+0xa0/0xa0 [ 1763.911387][ C0] ip6_rcv_finish_core.isra.0+0x168/0x580 [ 1763.911390][ C0] ip6_rcv_finish+0x176/0x310 [ 1763.911393][ C0] ipv6_rcv+0xf8/0x3f0 [ 1763.911396][ C0] ? ip6_rcv_core.isra.0+0x1cb0/0x1cb0 [ 1763.911400][ C0] ? find_held_lock+0x2d/0x110 [ 1763.911403][ C0] ? ip6_rcv_finish_core.isra.0+0x580/0x580 [ 1763.911407][ C0] ? ip6_rcv_core.isra.0+0x1cb0/0x1cb0 [ 1763.911410][ C0] __netif_receive_skb_one_core+0x114/0x180 [ 1763.911414][ C0] ? __netif_receive_skb_core+0x31c0/0x31c0 [ 1763.911417][ C0] ? mark_held_locks+0x9f/0xe0 [ 1763.911420][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 1763.911423][ C0] __netif_receive_skb+0x27/0x1c0 [ 1763.911426][ C0] process_backlog+0x21e/0x7a0 [ 1763.911430][ C0] ? lockdep_hardirqs_on_prepare+0x1bc/0x590 [ 1763.911433][ C0] net_rx_action+0x4c2/0x1070 [ 1763.911436][ C0] ? debug_smp_processor_id+0x2f/0x185 [ 1763.911439][ C0] ? napi_busy_loop+0x9e0/0x9e0 [ 1763.911443][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1763.911447][ C0] ? lockdep_hardirqs_on_prepare+0x1bc/0x590 [ 1763.911450][ C0] __do_softirq+0x26c/0x9f7 [ 1763.911453][ C0] do_softirq_own_stack+0x2a/0x40 [ 1763.911455][ C0] [ 1763.911459][ C0] ? ipvlan_process_multicast+0x7b7/0xca0 [ 1763.911462][ C0] do_softirq.part.0+0x10f/0x160 [ 1763.911465][ C0] __local_bh_enable_ip+0x20e/0x270 [ 1763.911468][ C0] ipvlan_process_multicast+0x7e6/0xca0 [ 1763.911471][ C0] ? ipvlan_mac_hash+0xd0/0xd0 [ 1763.911475][ C0] ? debug_smp_processor_id+0x2f/0x185 [ 1763.911478][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1763.911482][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1763.911485][ C0] process_one_work+0x965/0x16a0 [ 1763.911488][ C0] ? lock_release+0x800/0x800 [ 1763.911491][ C0] ? pwq_dec_nr_in_flight+0x310/0x310 [ 1763.911495][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 1763.911498][ C0] worker_thread+0x96/0xe20 [ 1763.911501][ C0] ? process_one_work+0x16a0/0x16a0 [ 1763.911504][ C0] kthread+0x388/0x470 [ 1763.911507][ C0] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1763.911511][ C0] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1763.911514][ C0] ret_from_fork+0x24/0x30 [ 1763.960926][ T1145] Kernel panic - not syncing: hung_task: blocked tasks [ 1764.443110][ T1145] CPU: 1 PID: 1145 Comm: khungtaskd Not tainted 5.7.0-syzkaller #0 [ 1764.451001][ T1145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.461063][ T1145] Call Trace: [ 1764.464362][ T1145] dump_stack+0x188/0x20d [ 1764.468767][ T1145] panic+0x2e3/0x75c [ 1764.472673][ T1145] ? add_taint.cold+0x16/0x16 [ 1764.477358][ T1145] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 1764.483000][ T1145] ? preempt_schedule_thunk+0x16/0x18 [ 1764.488387][ T1145] ? watchdog+0xa8c/0x1010 [ 1764.492810][ T1145] ? nmi_trigger_cpumask_backtrace+0x214/0x27e [ 1764.498974][ T1145] watchdog+0xa9d/0x1010 [ 1764.503228][ T1145] ? reset_hung_task_detector+0x30/0x30 [ 1764.508787][ T1145] kthread+0x388/0x470 [ 1764.512860][ T1145] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1764.518579][ T1145] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 1764.524307][ T1145] ret_from_fork+0x24/0x30 [ 1764.530421][ T1145] Kernel Offset: disabled [ 1764.534777][ T1145] Rebooting in 86400 seconds..