0bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:27 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 334.738642][T15213] device bridge6 left promiscuous mode [ 334.774819][T15213] device vlan0 left promiscuous mode 16:40:27 executing program 4: r0 = epoll_create1(0x80000) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18040008000000000000000008000000180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:27 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 334.927636][T15245] validate_nla: 8 callbacks suppressed [ 334.927656][T15245] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000104fe104b67ec0001000000009f", @ANYRES32=r5, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070001"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8b33, &(0x7f0000000040)) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=@newqdisc={0x110, 0x24, 0x200, 0x5, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0xfff3, 0xd}, {0xd, 0x5}, {0x4, 0x2}}, [@TCA_STAB={0xe4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xf9, 0x52, 0x9, 0x7, 0x0, 0x800, 0xe8a9, 0x5}}, {0xe, 0x2, [0x4, 0x1, 0xfff, 0x8, 0x5]}}, {{0x1c, 0x1, {0xe7, 0x2, 0x8, 0x1000, 0x0, 0x1569, 0x1, 0x6}}, {0x10, 0x2, [0x1, 0x0, 0x9, 0x1, 0x40, 0x1]}}, {{0x1c, 0x1, {0x6, 0x80, 0x7ff, 0x5, 0x0, 0x1, 0x7ff, 0x5}}, {0xe, 0x2, [0x3, 0xffff, 0x2, 0xe905, 0x401]}}, {{0x1c, 0x1, {0x0, 0x3f, 0x401, 0x0, 0x0, 0x6896a1de, 0x8, 0x7}}, {0x12, 0x2, [0x101, 0x1, 0x6, 0xffff, 0x9, 0x6, 0x9]}}, {{0x1c, 0x1, {0xf6, 0x3e, 0x2, 0x1400, 0x2, 0x9, 0x7, 0x5}}, {0xe, 0x2, [0xe173, 0x2, 0x8, 0x8000, 0x7]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xffff8001}]}, 0x110}}, 0x95) 16:40:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r4, &(0x7f0000000240)=[{{&(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x100}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)}, {&(0x7f00000002c0)="1c0743956d9f79450a69cea8cc000795bb26486e8e1c8b6a58717a8ff5f2e5b4ee5384a90195e84871749b07f93eac3b85cf2e9b4667656b097bf89bd3eec0ce234073677d3217b24ca0ef82e5e7d01dbccdf37594be76029b086108918fee41d81c4a10c9ff6cb421f42f4c847170d629ce57e632fbbd1889db505b9cc1d184db505ee9032ae5bd1bc5df77cc0597f3d2295c22d6f13adb196aed22b4563a1eb644a373dc63", 0xa6}, {&(0x7f00000003c0)="9a58f40d1fde0f708a34fb2d966bb04508ae4e71e539b83780bf611fe36d5dccc67d018880cc1e12fe620260157d2da25b98ececc3b078886361c8f1bb3c87fcb019485c58f6bc68f1634989fc5b69acd2abdd49e00f5a24ec948fd3cb0b39a489dc99d07e32e93174c699685751d5689b4ff313d729b7f2cd73b9d7a1987212b52da0fd81408f26cf683237db14dfba5e8ed283838f9bb08c32cd486b8e9dd44605a22b94697648cfd96bad85775f54637efa537ecff344596dd84395432eee1cb11c350f9e92", 0xc7}, {&(0x7f0000001340)="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", 0x1000}], 0x4, &(0x7f00000004c0)=[{0xf8, 0x117, 0x4, "75152b4f6459e68043528d474096b19aa285c55740bb779485783f573e4fd83be8331c0f1951722fdd147493013862e5dfb2185a8ebba0f98485791f613ae315c973dd71725e0f8590aaf466a629d532960d75fb9bb72ca9fbb879787b9ce3850211200bd03f623b98514d8ee1397e6d087c0fdaf9b9ff48015c9d6e2563485128e119d644f2abce7a601ebd0e96c1af555d7c1916c1f4cf70c871a9e94b55ba65c1c16d7b225e09ab31840586aaab2064514c9da93cf48a04516b6f5d421eb54e259c5a180a35cce6de808c1e22c293975d91059fa00e9e021c17c5059af85d4d9ee2fe37d2"}], 0xf8}}], 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000080)=0x80000000, 0x4) r5 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0)='freezer.state\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r5, 0x40089413, &(0x7f0000000600)=0x9) 16:40:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:27 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000001680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000000100)={0x1508, 0x1, 0x5, 0x301, 0x0, 0x0, {0x2, 0x0, 0x1}, [{{0x254, 0x1, {{0x0, 0x5681}, 0xeb, 0x96, 0x7, 0x0, 0x12, 'syz0\x00', "4d558eda8dc0f34f70d7c28c6078380281cc0f165a9c40ee08e9ceb6cae00eb3", "1b78108134bf40287d8af7ad39c6fac414cc57eef9895623fb2c1f242bf878ab", [{0x7ff, 0x9000, {0x2, 0x7fffffff}}, {0x8, 0x5, {0x3, 0x9}}, {0x4, 0x3, {0x1, 0x3}}, {0x0, 0x72, {0x3, 0xffffffff}}, {0x8, 0x14, {0x1, 0x4}}, {0x2, 0xc1b, {0x2, 0x9a1a}}, {0x3, 0x0, {0x1, 0xf4fb}}, {0xfffc, 0x6b8, {0x0, 0xffffff80}}, {0x3, 0x6, {0x2, 0x3}}, {0x8, 0x80, {0x0, 0x3}}, {0x7f, 0x4, {0x2, 0xd2b}}, {0x1, 0x7, {0x2, 0x8}}, {0x4, 0x4, {0x1, 0x81}}, {0x400, 0xf1, {0x1, 0x10001}}, {0x7f, 0x2, {0x0, 0x635}}, {0x6, 0x0, {0x1, 0xff}}, {0x5, 0xd5b9, {0x3, 0x3}}, {0xf76a, 0x1, {0x1, 0x7}}, {0x8, 0x5, {0x2, 0xacef}}, {0x4, 0x4, {0x1, 0x6b400000}}, {0x4, 0x1f, {0x3, 0x8}}, {0x1ff, 0xe43, {0x1, 0x5a3b3fe9}}, {0x278, 0x101, {0x0, 0xffff}}, {0x7ff, 0x1, {0x2, 0x2}}, {0x1, 0xd7, {0x2, 0x991}}, {0xeb1b, 0xfffb, {0x1, 0x101}}, {0x7fff, 0x5, {0x2, 0x7}}, {0x400, 0x1, {0x2, 0x5}}, {0x9, 0x0, {0x3, 0x1}}, {0xe994, 0x5, {0x1, 0x3f}}, {0xfe2, 0x3f, {0x3, 0x5}}, {0x7dea, 0x1, {0x1, 0x8}}, {0x24c2, 0xdd2, {0x0, 0x1}}, {0x8, 0x1, {0x1, 0x8}}, {0x7fff, 0x8b, {0x2, 0x7}}, {0x8, 0x7f, {0x3}}, {0x6, 0x6, {0x8be7e0cf17b1a38, 0x40}}, {0x401, 0x80, {0x0, 0x6}}, {0x401, 0x4, {0x1, 0x101}}, {0x80, 0x65a4, {0x3, 0x4}}]}}}, {{0x254, 0x1, {{0x3, 0x638322bd}, 0x81, 0x6, 0x6, 0xff, 0x1a, 'syz1\x00', "efd948b86ce1d01fda00d45577b189f6fbb89828b46a744c542f9ae5970a6f5b", "279a51be9be925cf1ae6e68309e21fec60c75b2e7b5d98004888374d55fb0adf", [{0x6, 0x6, {0x0, 0x81}}, {0x6, 0x40, {0x1, 0xffff}}, {0xfa3b, 0x9, {0x0, 0x8}}, {0x0, 0x0, {0x3}}, {0x9, 0x7, {0x1, 0x40}}, {0x5, 0xfffa, {0x0, 0x10001}}, {0xffff, 0xc3, {0x0, 0x7}}, {0x1, 0x3d, {0x2, 0x1}}, {0x2, 0x9, {0x3, 0x4}}, {0x9, 0x81, {0x1, 0xcd61}}, {0x7fff, 0x9, {0x0, 0x1}}, {0x746, 0x80, {0x1, 0x80000000}}, {0x3, 0xaa05, {0x2, 0xffffffff}}, {0x0, 0xef9, {0x3, 0x4}}, {0xf68, 0xa9a, {0x0, 0x80000001}}, {0x3f, 0x1, {0x2, 0x6}}, {0x4, 0x20, {0x2, 0x1ff}}, {0x9, 0x9, {0x2, 0x7fffffff}}, {0x3f, 0x80, {0x2, 0x3}}, {0x8, 0x0, {0x3, 0x77818e6c}}, {0x100, 0x1000, {0x3, 0x100}}, {0x3f, 0x574, {0x3, 0x80}}, {0x20, 0x76, {0x0, 0xd4d}}, {0x51, 0x9e34, {0x81bd835e2355a74a, 0x81}}, {0x3, 0x8, {0x1, 0x1}}, {0x53, 0x96c3, {0x3, 0x7}}, {0x8000, 0x7fff, {0x0, 0x7}}, {0x2, 0xc73f, {0x3, 0x7}}, {0x1, 0x9, {0x3, 0xffffffff}}, {0xffff, 0x4, {0x0, 0x10000}}, {0x8, 0x401, {0x3, 0x5}}, {0x2, 0x6, {0x3, 0x4}}, {0x2, 0x101, {0x3, 0x8}}, {0x1, 0xb7f9, {0x0, 0xfffffffa}}, {0xd, 0x1ff, {0x2, 0xaf5}}, {0x1, 0x20, {0x0, 0x4}}, {0x1, 0x7, {0x0, 0xffff}}, {0x3f, 0x7fff, {0x3, 0xc664}}, {0x3f, 0x3, {0x3, 0x7}}, {0x3ff, 0x101, {0x3, 0x10001}}]}}}, {{0x254, 0x1, {{0x2, 0x9}, 0x1, 0x3, 0x1, 0x5, 0x21, 'syz0\x00', "19da718fb4b147ff3f45f372f2393996dae932dfbd6be76e7e2ecb1559197033", "bb81b1f33577dd79d987784aa40c419af771e641f9d3381b83edf59dd21c68d3", [{0x2, 0x7, {0x1, 0x2}}, {0xffff, 0x7, {0x2, 0xff}}, {0x99a6, 0x9, {0x1, 0x8}}, {0x0, 0x8, {0x0, 0x5a}}, {0xffff, 0x0, {0x1, 0x2}}, {0x0, 0x4, {0x3, 0x1}}, {0x6, 0x2, {0x2, 0x1}}, {0x3, 0x6, {0x1, 0x1}}, {0xfe66, 0x6, {0x1, 0x6}}, {0xfff8, 0x6, {0x0, 0x4c}}, {0x9, 0x2, {0x0, 0x9}}, {0x6b, 0x2, {0x2bd83674bf95488, 0xb5}}, {0x401, 0xc1, {0x1, 0x9}}, {0x3f, 0x6, {0x1, 0x10000}}, {0x0, 0x5db, {0x3, 0x5}}, {0x100, 0x3, {0x0, 0x9}}, {0xffff, 0x9, {0x1}}, {0x5, 0x9, {0x2, 0x7}}, {0x40, 0x4fb, {0x3, 0x5}}, {0x2, 0x5, {0x0, 0x8001}}, {0xb3, 0xfb98, {0x0, 0x3}}, {0xff, 0x43, {0x2, 0x40}}, {0x4, 0x7, {0x3, 0x3}}, {0x0, 0x6, {0x0, 0x101}}, {0x4, 0x3, {0x2, 0x57d}}, {0x8001, 0x7ff, {0x0, 0x3}}, {0x2, 0x492, {0x0, 0x8001}}, {0xb6a, 0x42d, {0x1, 0x140b2c2d}}, {0x36c, 0x9, {0x0, 0x6}}, {0x3f, 0x81, {0x1, 0x10000}}, {0x3, 0x3, {0x0, 0xc17d}}, {0x4, 0x9, {0x2, 0x3f}}, {0x401, 0x2, {0x0, 0x3}}, {0x6, 0xffff, {0x3, 0x6}}, {0x800, 0x39, {0x2, 0x3}}, {0x3ff, 0x0, {0x0, 0x1}}, {0x2, 0x7005, {0x1, 0x7}}, {0x3, 0x3, {0x0, 0x5}}, {0x16, 0x4, {0x3, 0x101}}, {0x6e5, 0x8, {0x3, 0x1b6}}]}}}, {{0x254, 0x1, {{0x3, 0x100}, 0x7, 0x3, 0x6, 0x7fff, 0x1a, 'syz0\x00', "14382493414d6652a59a08a7275c3ced4ab48e480f5aae747d26727777741ee5", "6344001c154ba624e19b9dbc9d64cc09e1e4edd2b9970df246184e1f99f8eee0", [{0x7, 0x4, {0x3, 0x200}}, {0x3f, 0x1f, {0x0, 0x10000}}, {0x8, 0x8, {0x1, 0x3}}, {0xe73a, 0xfffa, {0x0, 0x8}}, {0x3, 0xff75, {0x2}}, {0x858, 0x0, {0x2, 0x7fffffff}}, {0xfff9, 0xfe00, {0x1, 0x4b}}, {0x7, 0xa7e, {0x3}}, {0x7f, 0x1, {0x2, 0x9}}, {0x101, 0x101, {0x1, 0xda}}, {0x0, 0x0, {0x0, 0x7b9}}, {0x198c, 0x7f, {0x1, 0xd39}}, {0x1, 0x3, {0x1, 0x5}}, {0x6, 0x20, {0x1, 0x6}}, {0x9, 0x4, {0x1, 0x7ff}}, {0x3f, 0x3ff, {0x1, 0x6}}, {0x9, 0x7fff, {0x1, 0x4}}, {0xbd51, 0x9d, {0x3, 0x9e}}, {0x6c7b, 0x5636, {0x3, 0x8001}}, {0x400, 0x100, {0x2, 0x9}}, {0x7, 0x8001, {0x1, 0x1}}, {0x7fff, 0x2, {0x1, 0x36eb3578}}, {0x50f, 0xd9c, {0x3, 0x1b30}}, {0x2, 0x5, {0x0, 0x1f}}, {0x3ff, 0x100, {0x0, 0x2}}, {0x1000, 0xfe4, {0x2, 0x1db}}, {0x6a4, 0x1ff, {0x2, 0x81}}, {0xc10d, 0x0, {0x1, 0x1ff}}, {0x3f, 0x31, {0x1, 0x374}}, {0x8000, 0x989, {0x3, 0xb18}}, {0x9, 0x7, {0x1, 0x1}}, {0x8, 0x800, {0x2, 0x3}}, {0x9, 0x699, {0x3, 0x1000}}, {0x4, 0x1, {0x2, 0x20}}, {0xff, 0x7, {0x3, 0x3}}, {0x801, 0x2000, {0x3, 0x4}}, {0x400, 0x1, {0x2, 0x2}}, {0x8, 0xfffd, {0x3, 0x7fff}}, {0x9, 0x8, {0x2, 0x80000000}}, {0x8001, 0x401, {0x3, 0xffffead2}}]}}}, {{0x254, 0x1, {{0x1}, 0x2, 0x5, 0x8000, 0x7, 0x25, 'syz0\x00', "423a279b019785fe2b4a956b1382ab0c869c5a491da2645c2819018c2b48dbc4", "e9b69db39b24707d134ce5a68f6d4e77a2733e40346adccbe226343461985e67", [{0x7, 0xffff, {0x2, 0x8001}}, {0xf8, 0x69de, {0x1, 0xff}}, {0x40, 0x1ff, {0x1, 0x6}}, {0x20, 0xda, {0x3, 0x5}}, {0x8, 0x5, {0x1, 0x2}}, {0x0, 0x200, {0x0, 0x2}}, {0x1, 0x7, {0x2, 0x2}}, {0x1, 0xb3a8, {0x3, 0x5}}, {0x1f, 0x7, {0x2, 0x1}}, {0x81, 0x8000, {0x0, 0x100}}, {0xf7, 0x6, {0x3, 0x1ff}}, {0x0, 0x43, {0x0, 0x8000}}, {0x9, 0x0, {0x3, 0x1}}, {0x30, 0x61b3, {0x0, 0x200}}, {0x80, 0x4, {0x0, 0x4}}, {0x1, 0x81, {0x3}}, {0x2, 0x1000, {0x0, 0x7}}, {0x0, 0x3, {0x2, 0x7}}, {0x1, 0xfff9, {0x3, 0x8}}, {0x1000, 0x1}, {0x8, 0x6, {0x1, 0xffffffff}}, {0x9, 0x5, {0x1, 0x10000}}, {0x8000, 0xffff, {0x3, 0xc0}}, {0xb4, 0x1000, {0x0, 0x40}}, {0xf159, 0x1, {0x1, 0x3}}, {0x9, 0x1, {0x2, 0x4}}, {0x40, 0x6, {0x2, 0x8000}}, {0x8, 0x9, {0x2, 0xfffff0b0}}, {0x8, 0x7f, {0x3, 0x10001}}, {0x6, 0x2, {0x3, 0xffff7fff}}, {0xfff, 0x0, {0x0, 0x4}}, {0x8, 0x6, {0x1, 0x5}}, {0xa56b, 0x5, {0x1, 0x6}}, {0x8000, 0x400, {0x0, 0x7fff}}, {0x7ff, 0xff, {0x0, 0x59ff0db0}}, {0x0, 0x7, {0x21abea00ff972229, 0xe2800000}}, {0x1, 0x0, {0x3, 0x4}}, {0x101, 0x2, {0x1, 0xfffffffc}}, {0x1, 0x8, {0x1, 0x9e38}}, {0x5, 0x1, {0x2, 0xfff}}]}}}, {{0x254, 0x1, {{0x0, 0x3}, 0x7, 0x3f, 0xfaa, 0x7, 0x9, 'syz0\x00', "028bba8a808b314211c2c9bbf08ca6b549f32a3399a0d2fcf88e0456b65aac1f", "c9bff76ca2db95c4e310be9f97b8365154a7020116dd04a410a2630c8a5fb693", [{0xc32e, 0x7, {0x0, 0x3}}, {0x60, 0x0, {0x1, 0x8}}, {0xbba, 0x800, {0x1, 0x9}}, {0x4, 0x1, {0x3, 0x7fffffff}}, {0x2, 0x9, {0x2, 0x6f}}, {0x2, 0x76b, {0x1, 0x401}}, {0x8f40, 0x3f, {0x0, 0x8}}, {0xfffa, 0x3, {0x0, 0x2}}, {0x200, 0xa19, {0x3, 0x3}}, {0x5, 0x1, {0x3, 0x1}}, {0x9, 0x12e8, {0x1, 0x6}}, {0x8, 0x8, {0x2, 0x1311}}, {0x6, 0x0, {0x1, 0x7}}, {0x1, 0x5, {0x1, 0xffffffff}}, {0x4, 0x400, {0x0, 0x2}}, {0xfffc, 0x7, {0x1, 0x1000}}, {0x7f, 0x9, {0x2, 0x800}}, {0x0, 0x9, {0x0, 0x1}}, {0x0, 0x1ff, {0x2}}, {0x96, 0x4, {0x0, 0x6c19}}, {0x7ff, 0x6, {0x0, 0x4}}, {0xda, 0x5, {0x0, 0x2}}, {0x3ff, 0x400, {0x1, 0x2}}, {0x2000, 0x0, {0x1, 0x5d}}, {0x1, 0xa9, {0x0, 0x8000}}, {0x9, 0x6, {0x3, 0xffff}}, {0x1f, 0x200, {0x2, 0x7ff}}, {0x6, 0x4, {0x0, 0x7f}}, {0x101, 0x40, {0x3, 0x2}}, {0x4, 0x4, {0x1, 0x8}}, {0x6, 0x8, {0x2, 0x8}}, {0x9, 0x0, {0x2, 0x800}}, {0x3c, 0x8, {0x0, 0x8}}, {0x7, 0x3, {0x1, 0x969}}, {0x1, 0x9, {0x0, 0x3}}, {0x20, 0x63e, {0x1, 0x3}}, {0xf81f, 0x2, {0x0, 0x3}}, {0x1, 0x1000, {0x2, 0x4000000}}, {0x7, 0xfffb, {0x1, 0xfffffff9}}, {0x2, 0xdf4, {0x1, 0x3}}]}}}, {{0x254, 0x1, {{0x2, 0xe6db}, 0x8, 0xd5, 0x1000, 0xfff, 0xd, 'syz1\x00', "b76f0dee1de5fa3d45a6dfe6356283c99629d3b553fb78494922fe15172b256a", "710cf3619b203246664259d58fc714fcb98f069fc8238f0a831fa7ef401fbf5d", [{0x4, 0x7, {0x0, 0x3}}, {0x6, 0x4, {0x3, 0x39b}}, {0x8001, 0x5, {0x2, 0x4}}, {0x3, 0x6, {0x3, 0x3ff}}, {0x4bac, 0x5, {0x1, 0x3}}, {0x1, 0x5, {0x0, 0x8}}, {0x1, 0x800, {0x1, 0x7}}, {0x3f, 0x0, {0x0, 0x9f}}, {0x28, 0x1, {0x3, 0x1}}, {0x8, 0x2, {0x0, 0x198}}, {0x2, 0xfffc, {0x1}}, {0x3, 0x4c5a, {0x1, 0x140}}, {0x6, 0x7, {0x3, 0x6}}, {0xfff7, 0x1, {0x1, 0x83c}}, {0x0, 0x0, {0x3}}, {0x3, 0x8, {0x3, 0x7}}, {0x8, 0x3, {0x3, 0x16}}, {0x800, 0x20, {0x2, 0x106}}, {0x4, 0x3ff, {0x3, 0x5}}, {0x7, 0x1, {0x1, 0x3}}, {0x101, 0x5, {0x3, 0x3}}, {0x1, 0x40f, {0x0, 0x7}}, {0x80, 0x5, {0x0, 0x4265}}, {0x1e, 0x1, {0x1, 0x2}}, {0x7, 0x401, {0x1, 0xe0}}, {0x1000, 0x0, {0x1, 0x3}}, {0x269, 0x4, {0x2, 0x6}}, {0x846, 0xffff, {0x2, 0x1}}, {0x8, 0x1, {0x3, 0x5}}, {0x4, 0x9, {0x3, 0x3}}, {0xfff, 0x75, {0x0, 0x48}}, {0x6, 0x5, {0x0, 0x7c3a}}, {0x5, 0x9, {0x0, 0x5}}, {0x6632, 0x4, {0x0, 0x1}}, {0x2, 0x360, {0x0, 0x3ff}}, {0x1, 0x400, {0x2, 0x8aa6}}, {0x5, 0xe0c3, {0x3, 0xcd18}}, {0x0, 0x4, {0x2, 0x3}}, {0x8, 0x6, {0x3, 0x3}}, {0x200, 0x3, {0x0, 0xff}}]}}}, {{0x254, 0x1, {{0x3, 0xbe14}, 0x6, 0x1, 0x7, 0x0, 0xd, 'syz1\x00', "d7704dd8772fc4add07915ac43c61a5919a58fe5ac079834b7acfdb653216e44", "4d8c14795599ed97b3325a03bc71d0ac553d495d6266e1dd2daf869f718f9991", [{0x7, 0x2, {0x1, 0x2}}, {0x400, 0x8000, {0x0, 0x6}}, {0x1, 0x5, {0x2, 0x40}}, {0x4, 0x3f, {0x0, 0x2}}, {0x200, 0x1ff, {0x3, 0x5}}, {0x7, 0x400, {0x3, 0x81}}, {0x2, 0x8, {0x0, 0x80000000}}, {0x8, 0x3, {0x1, 0x3}}, {0x20, 0x1, {0x2, 0x7fffffff}}, {0x1000, 0x101, {0x0, 0x5}}, {0x9, 0x6, {0x2}}, {0xc0, 0x7, {0x2}}, {0xd5, 0x1f, {0x0, 0x2}}, {0x6, 0xffff, {0x2, 0x1}}, {0x0, 0x1, {0x2, 0x4}}, {0x4, 0x2, {0x2, 0xffff}}, {0x6547, 0x3, {0x3}}, {0x4, 0x42c, {0x1, 0x5}}, {0x200, 0x1, {0x1, 0x8}}, {0x3, 0x40, {0x3, 0x7}}, {0x9, 0x3f, {0x1, 0x9}}, {0x0, 0x9, {0x2, 0x6}}, {0x3, 0x8, {0x2, 0x8}}, {0x4, 0x3ff, {0x1, 0x4}}, {0x1, 0x0, {0x1, 0x5}}, {0x1, 0x7, {0x2, 0x3}}, {0x7, 0x7, {0x1, 0x1}}, {0x81, 0x1f, {0x2, 0x32}}, {0x1, 0x7ff, {0x2, 0x3}}, {0x3, 0x0, {0x2, 0x8}}, {0x1f, 0x5, {0x1, 0x6}}, {0x8, 0x1000, {0x1, 0x86c}}, {0x5, 0x101, {0x3, 0x4}}, {0x13a, 0x4, {0x2, 0x10000}}, {0x0, 0x20, {0x2, 0x8}}, {0x5, 0x8001, {0x1, 0xbe7}}, {0x7, 0x58, {0x1, 0x10}}, {0x3, 0x2, {0x2, 0xe3}}, {0x271, 0x8fb, {0x0, 0x3}}, {0x1b3a, 0x5, {0x0, 0x9}}]}}}, {{0x254, 0x1, {{0x1, 0x101}, 0x10, 0x7, 0x8001, 0x6, 0x27, 'syz1\x00', "f3f5c66e940f1ff5e1179492cdbbb19c67fd8d459e39680e6056ff3dc0b8f696", "65782162eff3a7d4a9320a3387450af8b6c613d97818811800ea456b8d35c039", [{0x1, 0x0, {0x3, 0x7}}, {0x3ff, 0x3, {0x2, 0x800}}, {0x1, 0x3ae, {0x2, 0xfff}}, {0x3, 0x8001, {0x0, 0x200}}, {0x7f, 0x2, {0x1, 0x45}}, {0x0, 0x27, {0x3, 0x7}}, {0xfff, 0x7, {0x0, 0x200}}, {0xfff, 0x6, {0x1, 0x1000}}, {0x3, 0x3636, {0x3, 0xc9}}, {0x4, 0x486e, {0x2, 0xffff}}, {0x1, 0x0, {0x2, 0x800}}, {0xf001, 0xaaa9, {0x1, 0x39d23dc9}}, {0xff, 0x1ff, {0x3, 0x98b}}, {0xfff7, 0x1, {0x0, 0x9}}, {0x1, 0x1da, {0x2, 0x8}}, {0xfffa, 0x3f, {0x3, 0x81}}, {0x5, 0x5, {0x2, 0x2}}, {0x81, 0x9, {0x0, 0x8}}, {0x294d, 0x5, {0x0, 0x1}}, {0x0, 0x0, {0x3, 0x1}}, {0xfc4, 0x983, {0x2, 0x3}}, {0x3, 0x3, {0x1, 0x7fffffff}}, {0xfffd, 0x6, {0x0, 0xffffffe0}}, {0x6, 0x2fb5, {0x0, 0x9}}, {0x0, 0x2, {0x2, 0x7}}, {0xfeff, 0x1000, {0x1, 0x5}}, {0x5, 0x1fec, {0x3, 0x4}}, {0x3, 0x400, {0x2, 0x1}}, {0x9, 0x2, {0x2, 0x1}}, {0xfff, 0x80, {0x2, 0x1}}, {0x3, 0x5, {0x0, 0x3}}, {0xf011, 0x2, {0x0, 0xfffffff8}}, {0x0, 0x5, {0x2, 0x9}}, {0x7fff, 0x8, {0x1}}, {0x2, 0x7, {0x2, 0x6}}, {0x3, 0x5, {0x2, 0x800}}, {0x4, 0x3ff, {0x1, 0x8}}, {0x101, 0x1, {0x0, 0x20}}, {0x78, 0x8, {0x3, 0x5}}, {0x6, 0x0, {0x2, 0x8}}]}}}]}, 0x1508}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) recvmsg(r0, &(0x7f00000027c0)={&(0x7f00000016c0)=@isdn, 0x80, &(0x7f0000002740)=[{&(0x7f0000001740)=""/4096, 0x1000}], 0x1, &(0x7f0000002780)=""/57, 0x39}, 0x120) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000028c0)={&(0x7f0000002800)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002880)={&(0x7f0000002840)={0x1c, 0x0, 0x700, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004001}, 0x44) shutdown(0xffffffffffffffff, 0x80885439c742ba8e) r1 = accept4$ax25(r0, 0x0, &(0x7f0000002900), 0x800) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000002980)={0x0, @ethernet={0x0, @remote}, @in={0x2, 0x4e21, @multicast1}, @can, 0x5, 0x0, 0x0, 0x0, 0x400, &(0x7f0000002940)='lo\x00', 0xffffffffffffffff, 0x9, 0x9}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000002a00)="3e823c3e50f911b74fc44b29aa79b471", 0x10) r2 = socket(0x27, 0x3, 0x4) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000002b40)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002b00)={&(0x7f0000002a80)={0x5c, 0x0, 0x7, 0x401, 0x0, 0x0, {0x1}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xe82a}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xd34e}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2004015}, 0x8014) r3 = socket$kcm(0x29, 0x2, 0x0) close(r3) getsockname$packet(r2, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002bc0)=0x14) socket(0x28, 0x0, 0x8) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002c40)='nl80211\x00') sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c80)={0x2c, r4, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xbc9, 0x58}}}}, [@NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10081}, 0x20000800) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000002d80)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000002f00)={&(0x7f0000002d40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0xfc, r5, 0x4, 0x70bd29, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}]}, 0xfc}}, 0x4c000) pipe(&(0x7f0000002f40)={0xffffffffffffffff}) sendmsg$NL80211_CMD_JOIN_OCB(r6, &(0x7f0000003040)={&(0x7f0000002f80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000003000)={&(0x7f0000002fc0)={0x1c, r4, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1685}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x44840) 16:40:27 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 335.264431][T15259] bridge6: port 1(vlan0) entered disabled state 16:40:27 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 335.314303][T15259] bridge7: port 1(vlan0) entered blocking state [ 335.342090][T15259] bridge7: port 1(vlan0) entered disabled state [ 335.391639][T15266] device bridge7 entered promiscuous mode [ 335.408081][T15266] device vlan0 entered promiscuous mode [ 335.472617][T15266] device bridge7 left promiscuous mode [ 335.479976][T15266] device vlan0 left promiscuous mode [ 335.567304][T15267] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:27 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="397003001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r3, @ANYBLOB="00042dbd7000ffdbdf254b0000000c009900010000006b0000000a00f500b7cb20e72a36000024002c8008000000010000000800000000020000080000000010000008000000200000000400ff000a000600ffffffffffff000044002c80080000000000080008000000bc00000008000000040000000800000000800000080000009c0700000800000000180000080000000001000008000000010400000400ec000400ff0008009e0020200000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x240000d0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8}, @NL80211_ATTR_WIPHY_RETRY_LONG={0x5, 0x3e, 0x80}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\b\x00\x00', @ANYRES16=r1, @ANYBLOB="01000008000300", @ANYRES16=r0, @ANYRESDEC], 0x28}}, 0x0) 16:40:28 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:28 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 335.882447][T15292] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 335.943713][T15292] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39e603001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:28 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1e, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffff8}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}, 0x10}, 0x78) [ 336.292332][T15307] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 336.349494][T15307] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:28 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000240)=0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000000300)=@newqdisc={0x434, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x408, 0x2, [@TCA_TBF_PTAB={0x404}]}}]}, 0x434}}, 0x0) 16:40:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39fc03001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 336.721626][T15320] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 336.793177][T15322] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 336.825684][T15320] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 336.847825][T15320] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:29 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 336.914269][T15322] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 336.930263][T15326] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:40:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="cb00722a4d57771be0e06869572255c781d0b78a04cbfec5e3e5dad4", @ANYRES16=r3, @ANYBLOB="010000000000000000000a00000004000380"], 0x18}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x2) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000006980)={&(0x7f00000068c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000006940)={&(0x7f0000006900)={0x28, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fff}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0xc004) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000000)) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "9efa620a9c14898b", "0a1a555d81566a270fe9bf3bb290a624ad90b07703c9caf6d56449a61b4b26d7", "7e2b8382", "e5d7c972fee205f7"}, 0x38) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:40:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800e0ff", @ANYRES16=r7, @ANYBLOB="830000000000000000004a00000008000300", @ANYRES32=r8, @ANYBLOB="0c009900000000000000b53e2acabfdfc92732d22ded333a3c8d6f59ed56034bdecc562e82540d502d18ea6b053882565b387b7c25a2ead28fe1dc2ba3fcb48bc560609dd2c8f1896ac041d59fb8073013b6f88378e5e0ad077db1a373c24f05163ecf53ae352171525f634e69fd6716920a9e"], 0x28}}, 0x0) r9 = accept(r6, &(0x7f0000000440)=@alg, &(0x7f00000004c0)=0x80) sendmsg$TIPC_NL_LINK_SET(r9, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}]}, @TIPC_NLA_BEARER={0x4}]}, 0x48}}, 0x88d5) sendmsg$NL80211_CMD_GET_KEY(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x38, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xffffff31, 0x7c}}}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "24fa764836"}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x40080c0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x8, 0x0, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x4}]}, 0x20}}, 0x0) [ 337.164539][T15333] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:29 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 337.460661][ T171] net_ratelimit: 23 callbacks suppressed [ 337.460680][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:29 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:29 executing program 3: unshare(0x1a010800) r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket(0x21, 0x2, 0x2) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b00)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x2000c045) setsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000000)=0x8, 0x4) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0x905400) bind$packet(r0, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) unshare(0x6c060200) [ 337.640897][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 337.750647][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 337.771669][ T35] kauditd_printk_skb: 68 callbacks suppressed 16:40:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 337.771686][ T35] audit: type=1804 audit(1612024830.045:1436): pid=15358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/177/memory.events" dev="sda1" ino=15863 res=1 errno=0 [ 337.819947][T15357] IPVS: ftp: loaded support on port[0] = 21 [ 337.872205][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 337.951975][ T35] audit: type=1804 audit(1612024830.045:1437): pid=15355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/144/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 338.028346][ T35] audit: type=1800 audit(1612024830.045:1438): pid=15355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 [ 338.072966][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 338.260524][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 338.283393][ T35] audit: type=1804 audit(1612024830.045:1439): pid=15355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/144/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:40:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:30 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = socket(0x21, 0x2, 0x2) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x2000c045) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000900)={r0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="4400001e7408b45df4b70a52f000401000010400100000000000080000b03287ed234f0000", @ANYRES32=r4, @ANYBLOB="0000000000000000240015e5110001006272696467655f736c617661000000000c00050c08acb1929d699b096617e0b9f30236f2ffcfb4045bd646ee43839fb02f8977903e0fd7443c649876e51db925ef6f29ecf304d1de5f0db0e5ed67306c066e92bc0c814f266f86235acea4bca33a8fe0b80bb947f132683f74670f8c036af13aeb95e57a553eb3144c43129235"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x6c, 0x0, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x6}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x9}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0xff}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x91}, 0x80) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x3, @any, 0x8, 0x2}, 0xe) r5 = socket$nl_audit(0x10, 0x3, 0x9) connect(r5, &(0x7f0000000040)=@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x1, 0x88, "c0742ec6a7853932a5174e991ec37265207af96dd3a8207dea4de92498435a4a51cb124cc1cc2c4e5480be8e063b350b89c60dce85b19d0ea285fa18017d9c", 0x2}, 0x80) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) [ 338.369423][ T35] audit: type=1804 audit(1612024830.185:1440): pid=15359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/144/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 338.397858][T15389] IPVS: ftp: loaded support on port[0] = 21 [ 338.405268][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:30 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 338.560752][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:30 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 338.670512][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:31 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 338.775197][ T35] audit: type=1804 audit(1612024831.045:1441): pid=15419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/178/memory.events" dev="sda1" ino=16382 res=1 errno=0 [ 338.801979][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 338.926196][ T35] audit: type=1800 audit(1612024831.095:1442): pid=15419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16382 res=0 errno=0 16:40:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 339.107450][ T35] audit: type=1804 audit(1612024831.095:1443): pid=15419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/178/memory.events" dev="sda1" ino=16382 res=1 errno=0 16:40:31 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 339.160481][ T35] audit: type=1804 audit(1612024831.125:1444): pid=15423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/145/memory.events" dev="sda1" ino=16375 res=1 errno=0 [ 339.220610][ T35] audit: type=1800 audit(1612024831.125:1445): pid=15423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16375 res=0 errno=0 16:40:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39410d001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:32 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:32 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 340.077936][T15449] validate_nla: 15 callbacks suppressed [ 340.078046][T15449] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000f001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:32 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:32 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 340.508211][T15458] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 340.639861][T15458] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 340.640523][T15431] Bluetooth: hci5: command 0x0405 tx timeout 16:40:33 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x0, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390016001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:33 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 341.048563][T15469] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 341.094245][T15469] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390017001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 341.465494][T15481] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 341.528915][T15481] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:34 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x0, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390018001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 341.871111][T15489] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 341.908031][T15489] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39001e001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:34 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:34 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x0, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:34 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 342.334874][T15496] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:34 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39001f001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 342.540330][ T24] net_ratelimit: 25 callbacks suppressed [ 342.540350][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 342.700366][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 342.797478][ T35] kauditd_printk_skb: 60 callbacks suppressed [ 342.797495][ T35] audit: type=1804 audit(1612024835.065:1506): pid=15512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/149/memory.events" dev="sda1" ino=16380 res=1 errno=0 [ 342.834432][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:40:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390020001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:35 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 342.970331][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 343.052669][ T35] audit: type=1804 audit(1612024835.115:1507): pid=15511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/182/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 343.120401][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:35 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 343.240298][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 343.304929][ T35] audit: type=1804 audit(1612024835.255:1508): pid=15514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/137/memory.events" dev="sda1" ino=16368 res=1 errno=0 [ 343.360415][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:35 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39003f001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 343.490395][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:35 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 343.600476][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 343.621564][ T35] audit: type=1804 audit(1612024835.625:1509): pid=15520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/150/memory.events" dev="sda1" ino=15758 res=1 errno=0 16:40:35 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) [ 343.710200][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 343.828817][ T35] audit: type=1800 audit(1612024835.625:1510): pid=15520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15758 res=0 errno=0 16:40:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390d41001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:36 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 343.999088][ T35] audit: type=1804 audit(1612024835.625:1511): pid=15520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/150/memory.events" dev="sda1" ino=15758 res=1 errno=0 16:40:36 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 344.191781][ T35] audit: type=1804 audit(1612024835.805:1512): pid=15523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/150/memory.events" dev="sda1" ino=15758 res=1 errno=0 16:40:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 344.462642][ T35] audit: type=1804 audit(1612024835.925:1513): pid=15524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir103544290/syzkaller.bo1B28/128/memory.events" dev="sda1" ino=16372 res=1 errno=0 16:40:36 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 344.616205][ T35] audit: type=1800 audit(1612024835.925:1514): pid=15524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16372 res=0 errno=0 16:40:36 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 344.733203][ T35] audit: type=1804 audit(1612024835.925:1515): pid=15524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir103544290/syzkaller.bo1B28/128/memory.events" dev="sda1" ino=16372 res=1 errno=0 16:40:37 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) 16:40:37 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="396558001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 345.225659][T15569] validate_nla: 13 callbacks suppressed [ 345.225681][T15569] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 345.292037][T15569] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:37 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 345.721840][T15575] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 345.799369][T15575] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:38 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:38 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) 16:40:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="395865001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:38 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 346.128113][T15586] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 346.226489][T15586] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:38 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:38 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 346.652790][T15599] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 346.728488][T15599] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:39 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:39 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 347.196566][T15608] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 347.291946][T15608] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390370001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:39 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 347.610023][ T171] net_ratelimit: 31 callbacks suppressed [ 347.610044][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:39 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:40 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 347.809975][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 347.844822][ T35] kauditd_printk_skb: 66 callbacks suppressed [ 347.844841][ T35] audit: type=1804 audit(1612024840.115:1582): pid=15622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/188/memory.events" dev="sda1" ino=15776 res=1 errno=0 [ 347.930103][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:40 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 348.040065][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:40:40 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 348.113789][ T35] audit: type=1800 audit(1612024840.115:1583): pid=15622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15776 res=0 errno=0 [ 348.150505][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:40:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:40 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 348.260028][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 348.271828][ T35] audit: type=1804 audit(1612024840.125:1584): pid=15622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/188/memory.events" dev="sda1" ino=15776 res=1 errno=0 [ 348.369898][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 348.490050][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 348.508162][ T35] audit: type=1804 audit(1612024840.175:1585): pid=15624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/156/memory.events" dev="sda1" ino=16049 res=1 errno=0 16:40:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39fe80001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 348.591879][ T35] audit: type=1800 audit(1612024840.175:1586): pid=15624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16049 res=0 errno=0 [ 348.621351][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 348.655519][ T35] audit: type=1804 audit(1612024840.175:1587): pid=15621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/156/memory.events" dev="sda1" ino=16049 res=1 errno=0 16:40:41 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 348.729953][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:40:41 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 348.817492][ T35] audit: type=1804 audit(1612024840.245:1588): pid=15624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/156/memory.events" dev="sda1" ino=16049 res=1 errno=0 [ 348.869012][ T35] audit: type=1804 audit(1612024840.265:1589): pid=15627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/188/memory.events" dev="sda1" ino=15776 res=1 errno=0 16:40:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390081001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:41 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 349.092619][ T35] audit: type=1804 audit(1612024840.285:1590): pid=15626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/142/memory.events" dev="sda1" ino=16099 res=1 errno=0 [ 349.180410][ T35] audit: type=1800 audit(1612024840.285:1591): pid=15626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16099 res=0 errno=0 16:40:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39fec0001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:41 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3902c8001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3903e6001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:42 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:42 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900f0001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:42 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:42 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 350.435495][T15683] validate_nla: 16 callbacks suppressed [ 350.435518][T15683] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 350.496591][T15683] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fc001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:43 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) [ 350.829538][T15696] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:43 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3903fc001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:43 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:43 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$ppp(r0, &(0x7f0000000480)="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", 0x1000) [ 351.250203][T15711] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 351.346322][T15711] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:43 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fd001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:43 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:43 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:43 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000013c0)=[{{&(0x7f0000000780)=@phonet={0x23, 0x0, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000001640)=[{&(0x7f0000000740)="6b5613e376768c88bbef3cc3b530c39759bee6fea5c123ebbada2fb14ea877c29f8071d0877e374b4fe084549d088dbf66b417bb5d1675c835be795b", 0x3c}, {&(0x7f0000000800)="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", 0xce}, {&(0x7f0000000240)="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", 0xffffffffffffff16}], 0x3}}], 0x2, 0x0) [ 351.736132][T15726] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) 16:40:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3980fe001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:44 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:44 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:44 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:44 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 352.655235][T15736] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 352.689679][ T24] net_ratelimit: 28 callbacks suppressed [ 352.689697][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:40:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:40:45 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39c0fe001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 352.849675][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 352.850327][ T35] kauditd_printk_skb: 81 callbacks suppressed [ 352.850341][ T35] audit: type=1804 audit(1612024845.126:1673): pid=15751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/195/memory.events" dev="sda1" ino=15842 res=1 errno=0 [ 352.959737][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 353.017135][T15759] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getqdisc={0x28, 0x26, 0x1, 0x0, 0x0, {}, [{0x4}]}, 0x28}}, 0x0) [ 353.090991][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:45 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 353.123679][ T35] audit: type=1800 audit(1612024845.176:1674): pid=15751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15842 res=0 errno=0 [ 353.219711][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900ff001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 353.329673][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 353.401223][ T35] audit: type=1804 audit(1612024845.176:1675): pid=15752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/162/memory.events" dev="sda1" ino=16227 res=1 errno=0 [ 353.439776][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x2c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}, @AF_BRIDGE={0x4}]}]}, 0x2c}}, 0x0) 16:40:45 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 353.544463][T15771] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 353.604720][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 353.626541][T15771] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 353.633937][ T35] audit: type=1804 audit(1612024845.196:1676): pid=15755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/195/memory.events" dev="sda1" ino=15842 res=1 errno=0 16:40:46 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x6a8a80, 0x0) [ 353.729606][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 353.833121][ T35] audit: type=1804 audit(1612024845.266:1677): pid=15755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/195/memory.events" dev="sda1" ino=15842 res=1 errno=0 [ 353.860661][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/148, 0x1a, 0x94, 0x1}, 0x20) [ 354.062555][ T35] audit: type=1804 audit(1612024845.326:1678): pid=15758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/148/memory.events" dev="sda1" ino=15937 res=1 errno=0 16:40:46 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:46 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000640)={&(0x7f0000000040)=@sco, 0x80, 0x0}, 0x0) [ 354.256522][ T35] audit: type=1800 audit(1612024845.326:1679): pid=15758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=15937 res=0 errno=0 [ 354.375746][T15797] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 16:40:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 354.428335][ T35] audit: type=1804 audit(1612024845.346:1680): pid=15758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/148/memory.events" dev="sda1" ino=15937 res=1 errno=0 16:40:46 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff}, 0x0) 16:40:46 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 354.604061][ T35] audit: type=1804 audit(1612024845.436:1681): pid=15760 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/148/memory.events" dev="sda1" ino=15937 res=1 errno=0 16:40:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x2}]}}, &(0x7f0000000300)=""/144, 0x26, 0x90, 0x1}, 0x20) [ 354.844558][ T35] audit: type=1804 audit(1612024845.776:1682): pid=15767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/196/memory.events" dev="sda1" ino=15689 res=1 errno=0 16:40:47 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:47 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:47 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x40) 16:40:47 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390002001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 355.465426][T15834] validate_nla: 8 callbacks suppressed [ 355.466226][T15834] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:47 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 355.522686][T15834] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000000)="82c1ad923ffe155a5116921ae13045783cb155e07639979ba05406a5dc8d92e05660b410bcf146c3837c61342e96d76d2952197df5378cbfc7f999592897f5e9d753d59d709c0132c75ca7f5e07ddcc2449ff34d7d314976f6136f44ae0f25435291df8ea1798f0e7ed3c041f5921c4977dbcec85bd3374a1d7162e26d4f55a4fa09228f49cf8aa02e5e46253a78c70275", 0x91}], 0x1}, 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000003040)='freezer.state\x00', 0x2, 0x0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) r4 = socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) r8 = socket$isdn_base(0x22, 0x3, 0x0) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r10 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000030c0)='ns/net\x00') ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000003100)=0x0) r12 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = getpid() r15 = getpid() sendmmsg$unix(r13, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@cred={{0x1c, 0x1, 0x2, {r15, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r14}}}], 0x40}], 0x1, 0x0) r16 = getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003280)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000000c0)="3d197a0e4f68e5cd86fe456680fa2ca7e57da98b9a164c190a02127f974c8aa87f55f1d2bb200d70cf607821f53c151ea7dc8c0e87f091abea1810ee5d", 0x3d}, {&(0x7f00000001c0)="07b351804de299a9924f1cf651b4b30400544588bf0e316c130d6074781e8d0c5ca5a8f636161e9a2ed389932258db506cd12cfab565e8f6a870f45f75b659cf80b93bdbab951fd485b9e8eb288e1b8937f887821ea20fd96d307f647c891990fc0dbf841661e2c966d5365bef5ed176f0c4dc2e468b18c6c62dbdcae657c06740c206aeff42a48329eb2215d2fd03d08afb535628a51f7cc178dd9f3f", 0x9d}, {&(0x7f0000000280)="7303e9fca5dfd69f4a4920b7708a0a9a7134983fa66cd298c14bbdf804a78ed679bb4bb4ca", 0x25}, {&(0x7f00000002c0)="9b1801383854eb94ba66d5ce9b2b68709aa37e451fb3cc51affb67e3d4634c5eab3902aae50bb680d37ef53a40a25c2de067fccaec6e45162ec7941b158073e09623492f104bb7f8ad3bf29ebc861b0c5c6d318b8d07d44048b201937be5f523a0a36668366243ee523fe759312d6eb797878d1ac70037bf2c98cfdeff08c88696da126c36447e82e0ebf0389caefb589956200bb63f9ab118f5a4eba00c1f2ffdfd", 0xa2}, {&(0x7f0000000380)="c52e6fcedbf87fc616d2b7776f25f96e1f354fabb949159180af12b179eab24a3436a9e7452c78821b78af85450025b0ba8b068e57f0a329deec662c1f0ce1b20ce574e036a577f1cec7", 0x4a}, {&(0x7f0000000400)="c0a09452dfdae7ecb453c131cb5e50e7f8b609407b22e7b71fd4734dd9a79178c19e3adc4f1cbde382c3b34d309263bd048cc659346a011537c35939d35ae2e7551f04fa4deab295684155d535864bc4996a3f360ec2eb683636bb51d6d757b826ce3c5e88f41228494207a153a20ba2d3b285b9aeb9bef13e9caac7feff", 0x7e}, {&(0x7f0000000480)="fdb5c00ac2434411a2793f9d3e1710a98256dd1ede9bb8a757ce91b3b29fa7c8708220", 0x23}, {&(0x7f00000004c0)="316b3d1b36578ea8b54d72bf69449b065e7d63f9d279323d5d7292c9d7d18b1577d12e96e5b1018a010348524a6fa121d8b4ff7b79", 0x35}], 0x8, &(0x7f0000000680)=[@rights={{0x24, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xb0, 0x48000}, {&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000007c0)="86168ec9ea0db081b1b898bd8a51144519418fe67547fc68852c2cea3750a17c9611800b0f52506dd12212aadcefccb7e7f94adf4496c0691ab9d745bf9d6eb24841ed834887b7c007aec1f5ee7661a0d522de33351f60409051ecf2782385ae12fe427da342127b9abc0eec01f5f3640af987a953903565d0f226263ae50a3839d26409072e624912af2a07a681956e8a0cbea4a6e28493b8e5bc2144b1007d5f96", 0xa2}, {&(0x7f0000000880)="b972e854c744c2c67daaa5a1ae42c1bd1b9a8b36f6a0dc4afa63d14640b7cb1e32c2eab13ceb90af75c25a79be68315bb248b4dd84fa08cc117784af0d78e71daeb8d7813798638dd7d477298b896f3497d5282704d6d18a5a7c28bd401cf888ebe5df2f2fb0db", 0x67}, {&(0x7f0000000900)="d3cc26c98c814535bfd513503df985b848b495063d241991e1a66ef9b10ae8dc5d1cccbfc79b8d59d27419f7ee0181d630394e1b1a0a7472b50e2957ed069a2aabb9fa5cd2ecba23bdfa73fb5490c9b4dc60b108b60c97c92e5854f0a8d5bd983647629cbc2dd81a", 0x68}, {&(0x7f0000000980)="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", 0xfb}], 0x4, &(0x7f0000000c00)=[@rights={{0x28, 0x1, 0x1, [r1, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1]}}, @rights={{0x1c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, r1, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x160, 0x40}, {&(0x7f0000000d80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000011c0)=[{&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000000e00)="d28bba20f55105a25b4e086f6b3624512a19268c46cf4d5ec4c79a099a3cce93ff2b8a556cccdf40a2e9a2d5f65b00d96b48d160b667f0951fa403dca1c316b9050f82db7d0b7f83192220256d2430eca7f1caae7ca2d5cb9af4e88c01f68cada63ae761e72108ec639699e3b40a267811c8ae95238b6f1061ea28c8a08ba7d571efe560f8c3ad7236cb591cf5a82c4a660ded52451e5ad7e26042b224336c3431f2d818bb0b8b06", 0xa8}, {&(0x7f0000000ec0)="cf1c1e3bd09cf52626f0e56cf2f2b8e0e68f2ea5df195f1b9e8ae91ff5c2933f562603026c6cffa4e04cd28836ca8e77a89907d3e8a959224b5278afc96c843339f91ae5639e422fff26adcc0389511e8e647b9529df8f5cb02859e9e86a17b6c630d2c6c6194d4a98736ff5017a6b3c8860203c9b36706be07e638c0eccdf6dfabcc57eca29caca5abe607e03f20258e4e4ed4a0274083ae91c62aa9a0c3a726f2b99371334f7346c2944e6422c8f3019d7ff4e2e57d1c0b926eec50785496f6c4c", 0xc2}, {&(0x7f0000000fc0)="c339ec63a5331deb8bc290cbbad7fc1117a053d5c16c338fe4fc1f26b71e77ae346d6d096f88371d038792af2ca33e6ea10dc0f85dc1c365dfe1d51865fcd72f2eabf14ed6", 0x45}, {&(0x7f0000001040)="7950fd9b044d197bf38fe87be49ceb61e5d49db23c75ee76f860cfd7064bed276a3c8cdc02b7516cb46e0e4b369b00cb56f1087501c8a48b406f09be505f9b9602f642ccc0b4da9f27584ec1900f7e58f755fbb7c600061a9537b40afb89a51105bce8a56a00ea7507c366663aedc69c8615a715eaac7cebe41d2e4b09645136c95bb5", 0x83}, {&(0x7f0000001100)="3c1f70ac881fa593818d8724a6aa22a14d2886d4667e16b3816ba08d7622e0ca410a9fef182abd2ee7429135fe9b50fc50", 0x31}, {&(0x7f0000001140)="5e0789734d89ce20530aa91babcc714d8f58308573c0d42d978726bbb1675ae9010a3cb1025234e7d9c1e9cdd87dbdb749eb14ee0b514023ac00d35d8fe5606bbc3d9b338d5d5ac86dd60ff1aa7d69160dd96fde71b5191234b2a62bc62a44a2240c0653ad4c4c0e9c3e3de44b5f65dec0c89bb3bd24f3c35882852f01b7", 0x7e}], 0x7, 0x0, 0x0, 0x4048044}, {&(0x7f0000001240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f00000012c0)="e56be01f79b0d63ff31b7f67a444130ea96c6d5775aba4b239c323912bfebd401cbd952545076980c3b82ebdbafd95af74d995da629fabaecc72970bdea5b20b26b8cb2db7e2858ed8ff9ceb835654a6f5a6905a58e9878b9ab33061aecdbe5fbb8c9887e9b35edc6a158119693c1b10cf27e5d5973ca84db9ae8866c22c127c7470be257095d21d6ce7", 0x8a}, {&(0x7f0000001380)="a656045b21e00c74f1237230fb3038e0703c84ff218ce6b72125e22b613a12a7ca34baefdc376db75679b20c8dc9fc77aaddef8aa23cdecb9877e67839e391496c34535db49280cdd3e72f51d3d0c0ac86728525c39ea3c53b9a1e152df652c400b109297f9d2a826f675f4a1b5fdede1e60cbac047778057dc864da925ee744ae897800d3e1d8804988dc8ae1", 0x8d}, {&(0x7f0000001440)="312116c5fbd821c583f6da4d398e7a823373bf08c149d6954ec6bae05f4f30b4fdc955644e78bc33b0603cbe4aca8f60da5c790b2cd260646ced81187e11a1a86bfcbea7e01c981ebe50c2786050b67656e3a90c38787ca417ff6840bb4c4b741e960e410c4755811f5b4de13b3b108a69d7341dc19944fad714e8d1ed52eb9b03c936cf9c2b80fb8c1ce1a0173ec16edf0b8c80509ad4641528af5578eb0933fad4ddd5", 0xa4}, {&(0x7f0000001500)="ba46afaa38804d9e2a0f3104ab3c0a97c7cca2b4977a8c1778222d1e2035314f3716bffc1e5d2410e4588646e2b4a9fe0f81783551a38a511a32d7c1fbd3fc07408f49d63dbbd178f112d106f6732fbb1b2989cfb887dfaaf6e1edc65c4b3347b641122390480636adfcb4a645c7b353c286d7606bc01cb91326611b2d0598c7ee1e13909545ec70f57a5bb451e9c40d0ab3ee0739c0badb669b6442e4ec4c4c113bace09c98e6b5e6", 0xa9}], 0x4, &(0x7f0000002b00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, r0, r0, r0, r1, r1]}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x128}, {&(0x7f0000002c40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000002cc0)="4e5431439d1143aeab5aaca20e2ae1e79685bf4aeaf090a70d5630872b97b3c70f284bee7ab059a2dd977788bd02d286945a10ef0900928cf8c2b757a38e11022ed29a26169fd1b535b9cd73256a307a30da50f9f0a9262b740b09aa465b62afede6a5806d53df9c3cb6c8e6f142ec2c0c94fa0ae7396eeeef0314f3d57291716643db92384de6eb0d549306e6963f595228c7efbccef2d563cecb59b09a8084841e37bd46ad31d0c71ecf103d1881dc1c5e417e4545f4a2df535c0ea52a6f26341218294cb09f61aa5c08e840f4de5cb4eebc2443073bbcefe153279784c965902df7155dba", 0xe6}, {&(0x7f0000002dc0)="5dc15051957e72e44cba1baf3529685e81bb7689714e10f6e0fb83a91c991dd4bcda1cf46d9fd0f0175f", 0x2a}, {&(0x7f0000002e00)="b6a502e01510edceba22a517646b4f60e296c564419ea620989de41f8b04eca18477601c45a42cbd05d620e79db173d125035874617896d3004455d7a65ae6bc6a923b4d7e8e3b9ee9266707061f39eb584c1a20963522724f77f718e71f563e325bc900cd84fd0335a625130601cd7f64a9ed3b0748c234da790856d95a28f57ef63010aa6ce4720e88ff6754558a2e2dd43f5139059a681e23bde05c896e0e43d54c9905aab6439f78f4919649013dcd3c961f2c", 0xb5}, {&(0x7f0000002ec0)="e0b7fe7e4d", 0x5}, {&(0x7f0000002f00)="52892f1e0755a7b513527cd0380ebaac9fa32095befd60618e0abf95546329afdbed1541de8a8de05ac0f0eb7e0f9e916de4330b9991405cf1c7268cff93cafac03e4f3241da2b8eb78fe2bf428c5a10b8ae07bee26b4a17305baa5a4ca00073ff22b2dc857a382c0cfb5a1dae3f8239f5b1831603b89967a2542611", 0x7c}, {&(0x7f0000002f80)}], 0x6, &(0x7f0000003140)=[@rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r16}}}, @rights={{0x20, 0x1, 0x1, [r1, r2, r3, r0]}}, @rights={{0x2c, 0x1, 0x1, [r4, r5, r6, r8, r1, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r1]}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xffffffffffffffff, r16}}}], 0x108, 0x43}], 0x5, 0x4040000) 16:40:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x5, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000100)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 16:40:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 355.843695][T15849] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)=[{0xfffffffffffffffe}], 0x1}, 0x0) [ 355.930873][T15849] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x248522, 0x0) close(r0) 16:40:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390004001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:48 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x45, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:48 executing program 4: socketpair(0x23, 0x0, 0x2, &(0x7f0000000000)) 16:40:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x2}, 0x40) [ 356.368139][T15862] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 356.426724][T15862] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:48 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390005001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:48 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:48 executing program 4: socketpair(0x26, 0x5, 0x400, &(0x7f0000002b80)) 16:40:48 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000022c0)={0x9, 0x22, 0x1, 0x80, 0x0, 0x1}, 0x40) [ 356.685828][T15873] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x1}]}, @union]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/245, 0x3b, 0xf5, 0x9}, 0x20) [ 356.744638][T15873] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x101}]}]}}, &(0x7f00000001c0)=""/245, 0x32, 0xf5, 0x9}, 0x20) 16:40:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390006001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:49 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:49 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0xc002, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 357.056989][T15891] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 357.114322][T15891] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:49 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000003a00)={0x0, 0x0, &(0x7f0000002940)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:40:49 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390007001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:49 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x1100, 0x1}, 0x40) 16:40:49 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:50 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f000000fbc0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 357.729828][ T51] net_ratelimit: 32 callbacks suppressed [ 357.729848][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:50 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390008001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 357.864207][ T35] kauditd_printk_skb: 70 callbacks suppressed [ 357.864226][ T35] audit: type=1804 audit(1612024850.136:1753): pid=15914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/169/memory.events" dev="sda1" ino=15777 res=1 errno=0 [ 357.889604][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:40:50 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:50 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390009001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 358.049404][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 358.063703][ T35] audit: type=1800 audit(1612024850.136:1754): pid=15914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15777 res=0 errno=0 [ 358.208838][ T35] audit: type=1804 audit(1612024850.146:1755): pid=15914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/169/memory.events" dev="sda1" ino=15777 res=1 errno=0 [ 358.235173][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:50 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000180)='s', 0x1}], 0x2}, 0x0) 16:40:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0xc0045878, 0x0) [ 358.379668][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000a001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 358.520385][ T35] audit: type=1804 audit(1612024850.196:1756): pid=15913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/200/memory.events" dev="sda1" ino=15842 res=1 errno=0 [ 358.546496][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:50 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 358.679505][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:40:51 executing program 2: bpf$BPF_LINK_UPDATE(0x22, &(0x7f0000000640), 0x10) 16:40:51 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000003b80)={0x19, 0x0, 0x0, 0x5}, 0x40) [ 358.789390][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 358.806827][ T35] audit: type=1804 audit(1612024850.256:1757): pid=15920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/169/memory.events" dev="sda1" ino=15777 res=1 errno=0 16:40:51 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 358.899400][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:51 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x1b, 0x9}, 0x40) [ 359.009401][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x10, 0x1, 0x1}], 0x10}, 0x0) [ 359.055693][ T35] audit: type=1804 audit(1612024850.316:1758): pid=15922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/156/memory.events" dev="sda1" ino=16379 res=1 errno=0 [ 359.245625][ T35] audit: type=1800 audit(1612024850.316:1759): pid=15922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16379 res=0 errno=0 16:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000e001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:51 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5451, 0x0) 16:40:51 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 359.404944][ T35] audit: type=1804 audit(1612024850.316:1760): pid=15922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/156/memory.events" dev="sda1" ino=16379 res=1 errno=0 16:40:51 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, 0x0, 0x46, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000f001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 359.553902][ T35] audit: type=1804 audit(1612024850.446:1761): pid=15926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/156/memory.events" dev="sda1" ino=16379 res=1 errno=0 16:40:51 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 16:40:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xb}]}]}}, &(0x7f00000001c0)=""/245, 0x32, 0xf5, 0x9}, 0x20) [ 359.723243][ T35] audit: type=1804 audit(1612024850.586:1762): pid=15933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/201/memory.events" dev="sda1" ino=16383 res=1 errno=0 16:40:52 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390010001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:52 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, 0x0, 0x46, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00'}) 16:40:52 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:52 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) 16:40:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:40:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390016001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:52 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, 0x0, 0x46, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390017001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:52 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8940, &(0x7f0000000780)) 16:40:52 executing program 4: r0 = bpf$MAP_CREATE(0x2, &(0x7f00000003c0), 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) recvmsg(0xffffffffffffffff, &(0x7f0000015f80)={&(0x7f0000014940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000015ec0)=[{&(0x7f00000149c0)=""/218, 0xda}, {&(0x7f0000014ac0)=""/144, 0x90}, {&(0x7f0000014b80)=""/182, 0xb6}, {&(0x7f0000014c40)=""/122, 0x7a}, {&(0x7f0000014cc0)=""/60, 0x3c}, {&(0x7f0000014d00)}, {&(0x7f0000014d40)=""/170, 0xaa}, {&(0x7f0000014e00)=""/131, 0x83}, {&(0x7f0000014ec0)=""/4096, 0x1000}], 0x9}, 0x140) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000003000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000054c0)=[{&(0x7f0000003080)=""/4096, 0x1000}, {&(0x7f0000004080)=""/137, 0x89}, {&(0x7f0000004140)=""/136, 0x88}, {&(0x7f0000004200)=""/4096, 0x1000}, {&(0x7f0000005200)=""/135, 0x87}, {&(0x7f00000052c0)=""/164, 0xa4}, {&(0x7f0000005380)=""/52, 0x34}, {&(0x7f00000053c0)=""/212, 0xd4}], 0x8}, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000005580)={0x17, 0x0, 0xca2, 0x3, 0x97, r0, 0x7ff, [], r2, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000016040)=@bpf_ext={0x1c, 0xe, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x2, 0x2, 0x3, 0x1, 0xa, 0x8, 0x4}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x1, 0x0, 0x2, 0x6, 0x6, 0x80, 0xfffffffffffffff0}, @func, @map={0x18, 0x1, 0x1, 0x0, r0}, @map={0x18, 0x2, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xb3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x85c, 0x82, &(0x7f0000000100)=""/130, 0x100, 0x15, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000015fc0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000016000)={0x4, 0xc, 0x6, 0x7}, 0x10, 0x1737f}, 0x78) [ 360.637111][T16022] validate_nla: 20 callbacks suppressed [ 360.637132][T16022] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 360.685383][T16022] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:53 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:53 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8940, &(0x7f0000000780)) 16:40:53 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:53 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390018001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:53 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:53 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x55b700, 0x0) 16:40:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000300)=""/144, 0x1a, 0x90, 0x1}, 0x20) 16:40:53 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 361.517465][T16051] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1, 0xffffffe0}]}]}}, &(0x7f0000000300)=""/144, 0x32, 0x90, 0x1}, 0x20) [ 361.567572][T16051] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39001e001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:54 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:54 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8901, 0x0) 16:40:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 361.938037][T16067] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 361.975892][T16067] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1b, 0x12000000}, 0x40) 16:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390048001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000100)=""/148, 0x1a, 0x94, 0x1}, 0x20) 16:40:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xb00000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:54 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 362.274355][T16085] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 362.340570][T16085] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:54 executing program 2: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000640), 0x20000650) 16:40:54 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x10140) 16:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39004c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@fwd={0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000100)=""/4096, 0x43, 0x1000, 0x1}, 0x20) [ 362.678080][T16102] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 362.704392][T16102] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 362.749356][T11158] net_ratelimit: 31 callbacks suppressed [ 362.749377][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:55 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:55 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390060001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'syzkaller0\x00'}) 16:40:55 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 362.934459][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x7a}]}}, &(0x7f0000000100)=""/148, 0x26, 0x94, 0x1}, 0x20) [ 362.985103][ T35] kauditd_printk_skb: 95 callbacks suppressed [ 362.985122][ T35] audit: type=1804 audit(1612024855.256:1858): pid=16112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/212/memory.events" dev="sda1" ino=15789 res=1 errno=0 [ 363.079222][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390068001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:55 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f00000033c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000003480)="b7", 0x1}], 0x1}, 0x0) [ 363.163954][ T35] audit: type=1800 audit(1612024855.256:1859): pid=16112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15789 res=0 errno=0 [ 363.189052][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 363.309219][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:40:55 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:55 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 363.405269][ T35] audit: type=1804 audit(1612024855.256:1860): pid=16112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/212/memory.events" dev="sda1" ino=15789 res=1 errno=0 [ 363.429410][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39006c001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 363.539023][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 363.613420][ T35] audit: type=1804 audit(1612024855.326:1861): pid=16113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/178/memory.events" dev="sda1" ino=15791 res=1 errno=0 16:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390074001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 363.673368][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:40:56 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:56 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:56 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:56 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 363.804892][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 363.866240][ T35] audit: type=1800 audit(1612024855.326:1862): pid=16113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15791 res=0 errno=0 16:40:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000300)=""/144, 0x26, 0x90, 0x8}, 0x20) 16:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39007a001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 363.969047][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 364.000293][ T35] audit: type=1804 audit(1612024855.336:1863): pid=16113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/178/memory.events" dev="sda1" ino=15791 res=1 errno=0 [ 364.147903][ T35] audit: type=1804 audit(1612024855.406:1864): pid=16121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/212/memory.events" dev="sda1" ino=15789 res=1 errno=0 16:40:56 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:56 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0045878, 0x0) 16:40:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 364.268252][ T35] audit: type=1804 audit(1612024855.416:1865): pid=16120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/162/memory.events" dev="sda1" ino=16382 res=1 errno=0 [ 364.304493][ T35] audit: type=1800 audit(1612024855.416:1866): pid=16120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16382 res=0 errno=0 16:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900f0001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 364.363321][ T35] audit: type=1804 audit(1612024855.426:1867): pid=16120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/162/memory.events" dev="sda1" ino=16382 res=1 errno=0 16:40:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0xc0189436, 0x0) 16:40:56 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fc001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:40:57 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/245, 0x26, 0xf5, 0x9}, 0x20) 16:40:57 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fd001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@dev, @remote}, &(0x7f0000000040)=0xc) 16:40:57 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_buf(r0, 0x0, 0x22, &(0x7f0000000040)='_', 0x1) 16:40:57 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) getsockopt$inet_mreq(r0, 0x0, 0x14, 0x0, &(0x7f0000000180)) 16:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900c8021300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) getpeername$inet(r0, 0x0, 0x0) 16:40:57 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) getsockname(r0, 0x0, &(0x7f0000000240)) 16:40:58 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000031300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:58 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) select(0x40, &(0x7f0000000480)={0x9}, 0x0, 0x0, 0x0) 16:40:58 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) select(0x40, &(0x7f0000000480)={0x9}, 0x0, 0x0, 0x0) 16:40:58 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 365.896608][T16232] validate_nla: 18 callbacks suppressed [ 365.896629][T16232] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390070031300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:58 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:58 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:58 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000003240)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/120, 0x78}], 0x1}}], 0x1, 0x0, &(0x7f0000003340)={0x0, 0x3938700}) 16:40:58 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) [ 366.234625][T16248] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 366.289880][T16248] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900e6031300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:58 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)) 16:40:58 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 366.622900][T16264] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 366.667220][T16264] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:59 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fc031300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:59 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:59 executing program 4: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x40000300, 0x0, 0x0) [ 366.975911][T16276] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:59 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 367.029439][T16276] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:59 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:59 executing program 4: socket$packet(0x11, 0x3, 0x300) select(0x40, &(0x7f0000000480)={0x9}, 0x0, 0x0, 0x0) 16:40:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000000040)=@l2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="33f8a2", 0x3}], 0x1}}], 0x1, 0x4000010) 16:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000051300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:40:59 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1237d14f460093df, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 16:40:59 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:40:59 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 367.413462][T16293] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 367.483680][T16293] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:40:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000000040)=@l2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="33f8", 0x2}], 0x1}}], 0x2, 0x0) 16:40:59 executing program 4: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000800)=[{&(0x7f00000000c0)="04", 0x1}], 0x1}, 0x0) 16:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000061300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:00 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 367.818840][ T24] net_ratelimit: 32 callbacks suppressed [ 367.818860][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 367.876266][T16315] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 368.000080][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 368.031551][ T35] kauditd_printk_skb: 74 callbacks suppressed [ 368.031568][ T35] audit: type=1804 audit(1612024860.307:1942): pid=16319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/177/memory.events" dev="sda1" ino=15784 res=1 errno=0 16:41:00 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000064000000640000000300000001000000000000010000000076007402"], &(0x7f00000000c0)=""/129, 0x7f, 0x81, 0x1}, 0x20) 16:41:00 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8913, &(0x7f0000000040)={'batadv0\x00'}) 16:41:00 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000071300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 368.112518][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 368.248981][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 368.277926][ T35] audit: type=1804 audit(1612024860.547:1943): pid=16331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/219/memory.events" dev="sda1" ino=16378 res=1 errno=0 16:41:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0xd, 0x0, 0x0) 16:41:00 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000091300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:00 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000080), 0x2c) [ 368.390267][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 368.430106][ T35] audit: type=1800 audit(1612024860.547:1944): pid=16331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16378 res=0 errno=0 [ 368.508887][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:00 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 368.592506][ T35] audit: type=1804 audit(1612024860.557:1945): pid=16331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/219/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 368.626879][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:41:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:01 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:01 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:01 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x1b, &(0x7f0000000080), 0x2c) 16:41:01 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8901, &(0x7f0000000040)={'batadv0\x00'}) [ 368.748920][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 368.793250][ T35] audit: type=1804 audit(1612024860.737:1946): pid=16333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/219/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 368.859004][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x0, @remote}}) 16:41:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 368.961021][ T35] audit: type=1804 audit(1612024861.017:1947): pid=16347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/220/memory.events" dev="sda1" ino=15747 res=1 errno=0 [ 368.989204][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:01 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:01 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8912, &(0x7f0000000040)={'batadv0\x00'}) 16:41:01 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 369.116279][ T35] audit: type=1800 audit(1612024861.017:1948): pid=16347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15747 res=0 errno=0 16:41:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x13, 0x0, 0x0, 0x0, 0x814}, 0x40) [ 369.246010][ T35] audit: type=1804 audit(1612024861.027:1949): pid=16347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/220/memory.events" dev="sda1" ino=15747 res=1 errno=0 16:41:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:01 executing program 2: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12932, 0xffffffffffffffff, 0x0) [ 369.479925][ T35] audit: type=1804 audit(1612024861.157:1950): pid=16351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/220/memory.events" dev="sda1" ino=15747 res=1 errno=0 [ 369.612087][ T35] audit: type=1804 audit(1612024861.277:1951): pid=16357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/178/memory.events" dev="sda1" ino=16373 res=1 errno=0 16:41:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x26, &(0x7f00000000c0)=ANY=[], 0x0) syz_emit_ethernet(0x11, &(0x7f0000000140)={@dev, @empty, @void, {@llc_tr={0x11, {@llc={0x0, 0x0, "ee"}}}}}, 0x0) 16:41:02 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x29, 0x24, 0x0, 0x0) 16:41:02 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900410d1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:02 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0xf, 0x0, 0x0) 16:41:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x208}, 0x40) 16:41:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1237d14f460093df, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 16:41:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000f80)=ANY=[@ANYBLOB="fc110000", @ANYRES16=r1, @ANYBLOB="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"], 0x11fc}}, 0x0) 16:41:02 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000f1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:02 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8923, &(0x7f0000000040)={'batadv0\x00'}) 16:41:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000161300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000000040)=@l2tp, 0x80, 0x0}}], 0x1, 0x0) 16:41:03 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:03 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x29, 0x30, 0x0, 0x0) [ 370.906463][T16432] validate_nla: 17 callbacks suppressed [ 370.906485][T16432] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000004e80)=[{{&(0x7f0000000400)=@un=@abs, 0x80, 0x0}}], 0x1, 0x0) 16:41:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000171300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:03 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2f, &(0x7f0000000080), 0x2c) 16:41:03 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 371.341629][T16446] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:03 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001840)=[{{&(0x7f0000000040)=@l2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="33f8", 0x2}], 0x1}}, {{&(0x7f0000000100)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="52f2", 0x2}], 0x1}}], 0x2, 0x0) 16:41:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000181300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000005cc0)=[{{&(0x7f0000000040)=@l2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="33f8", 0x2}], 0x1}}], 0x1, 0x4000000) 16:41:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000009640)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x301}}}, 0x80, 0x0}}], 0x1, 0x0) [ 371.737195][T16461] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 371.794175][T16461] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:04 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:04 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x1000000) 16:41:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900001e1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:04 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001840)=[{{&(0x7f0000000040)=@l2tp, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="33f8", 0x2}], 0x1}}, {{&(0x7f0000000100)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="52f2", 0x2}], 0x1, &(0x7f0000000400)=[{0x10, 0x115}, {0x10, 0xf7}], 0x20}}], 0x2, 0x0) 16:41:04 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 372.129463][T16477] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 372.183198][T16477] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:04 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x29, 0x4, 0x0, 0x0) 16:41:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x12, 0x0, 0x0, 0xfffffffb}, 0x40) 16:41:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900001f1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:04 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 16:41:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0xc0002120, 0x0, 0x0) [ 372.625252][T16495] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:05 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x1000000) 16:41:05 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000201300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:05 executing program 4: socketpair(0x25, 0x3, 0x9, &(0x7f0000000080)) 16:41:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:05 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890d, 0x0) [ 372.928565][ T274] net_ratelimit: 34 callbacks suppressed [ 372.928586][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 373.041564][T16511] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 373.089424][ T35] kauditd_printk_skb: 38 callbacks suppressed [ 373.089443][ T35] audit: type=1804 audit(1612024865.367:1990): pid=16512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/184/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 373.121839][ T24] bond2: (slave bridge3): failed to get link speed/duplex 16:41:05 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xc, &(0x7f0000000080), 0x2c) [ 373.144720][T16511] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 373.161392][ T35] audit: type=1800 audit(1612024865.367:1991): pid=16512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 16:41:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xf, 0x4, 0x4, 0xfffffffb}, 0x40) 16:41:05 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 373.228742][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900003f1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 373.296332][ T35] audit: type=1804 audit(1612024865.367:1992): pid=16512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/184/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 373.368531][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:05 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x1600bd60, &(0x7f0000000080), 0x2c) [ 373.439240][ T35] audit: type=1804 audit(1612024865.427:1993): pid=16515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/225/memory.events" dev="sda1" ino=16366 res=1 errno=0 [ 373.471616][T16528] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 373.509470][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 373.541995][ T35] audit: type=1800 audit(1612024865.427:1994): pid=16515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16366 res=0 errno=0 [ 373.638658][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 373.720692][ T35] audit: type=1804 audit(1612024865.427:1995): pid=16515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir810899413/syzkaller.OVwjmS/225/memory.events" dev="sda1" ino=16366 res=1 errno=0 [ 373.758646][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 373.793695][ T35] audit: type=1804 audit(1612024865.437:1996): pid=16512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/184/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 373.876606][ T35] audit: type=1804 audit(1612024865.787:1997): pid=16527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/198/memory.events" dev="sda1" ino=16355 res=1 errno=0 [ 373.904831][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 373.935032][ T35] audit: type=1800 audit(1612024865.787:1998): pid=16527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16355 res=0 errno=0 16:41:06 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x1000000) 16:41:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000d411300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:06 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:06 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x5411, 0x0) 16:41:06 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2c, &(0x7f0000000080), 0x2c) 16:41:06 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 373.984911][ T35] audit: type=1804 audit(1612024865.797:1999): pid=16529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/185/memory.events" dev="sda1" ino=16365 res=1 errno=0 [ 374.038608][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 374.158583][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:41:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x5, 0x0, 0x0, 0x0, 0x1080}, 0x40) 16:41:06 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 16:41:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000481300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:06 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:06 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x34, 0x0, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}]}, @CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x4}]}, 0x34}}, 0x0) [ 374.636390][T16564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:07 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@generic={0x40}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbc}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xde, &(0x7f0000000140)=""/222, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:07 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @remote}, @in={0x2, 0x0, @local}, @l2tp={0x2, 0x0, @multicast1}, 0x3ff}) 16:41:07 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x541b, 0x0) 16:41:07 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000780)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 16:41:07 executing program 4: syz_emit_ethernet(0x12, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000008100100008"], 0x0) 16:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390065581300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:07 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:07 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x10, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x3e}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x1, &(0x7f0000000180)=@raw=[@alu={0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000601300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6c}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:07 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x60}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010100}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={r3}, 0x10) 16:41:08 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xa}]}]}}, &(0x7f00000000c0)=""/242, 0x32, 0xf2, 0x1}, 0x20) 16:41:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390058651300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) close(r0) 16:41:08 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:08 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f0000000200)) 16:41:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/242, 0x32, 0xf2, 0x1}, 0x20) [ 375.996486][T16621] validate_nla: 12 callbacks suppressed [ 375.996508][T16621] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000681300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:08 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000100)={r0, r1}) 16:41:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) [ 376.326614][T16639] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 376.357876][T16639] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:08 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 376.649865][T16651] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 376.683456][T16651] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:09 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:09 executing program 1: setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060002b4aa9bf211d328000000", @ANYRES32=r3, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="00f9ffffffffffff27001200090001007665746800000000180002001400f5a287690000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x500, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) close(0xffffffffffffffff) 16:41:09 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 376.844725][T16657] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 376.886511][T16657] device bond1 entered promiscuous mode [ 376.929637][T16694] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="00f9ffffffffffff27001200090001007665746800000000180002001400f5a287690000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32], 0x50}}, 0x0) 16:41:09 executing program 2: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060002b4aa9bf211d328000000", @ANYRES32=r2, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x500, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 16:41:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003701300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 376.993812][T16694] device veth3 entered promiscuous mode [ 377.011410][T16694] bond1: (slave veth3): making interface the new active one [ 377.027325][T16694] bond1: (slave veth3): Enslaving as an active interface with an up link 16:41:09 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 377.054309][T16657] bond1 (unregistering): (slave veth3): Releasing backup interface 16:41:09 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 377.365466][T16657] bond1 (unregistering): Released all slaves [ 377.448095][T16705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 16:41:09 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 377.586195][T16705] device bond2 entered promiscuous mode [ 377.597254][T16706] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 377.640709][T16707] bond2 (unregistering): Released all slaves [ 377.722278][T16711] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.4'. [ 377.764727][T16711] device veth5 entered promiscuous mode [ 377.836200][T16694] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 377.864831][T16702] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.1'. [ 377.943767][T16702] device veth5 entered promiscuous mode [ 377.992506][T16706] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 378.001939][T16705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 378.068333][ T171] net_ratelimit: 24 callbacks suppressed [ 378.068354][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:10 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000010000104000000000000008004000000", @ANYRES32, @ANYBLOB="0000bbb47f7e0000140012000c00010062"], 0x34}}, 0x0) 16:41:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000741300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:10 executing program 1: setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060002b4aa9bf211d328000000", @ANYRES32=r3, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="00f9ffffffffffff27001200090001007665746800000000180002001400f5a287690000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r3], 0x50}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x500, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r3}}, 0x20}}, 0x0) close(0xffffffffffffffff) 16:41:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060002b4aa9bf211d328000000", @ANYRES32=r2, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x500, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) close(0xffffffffffffffff) [ 378.228245][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 378.316541][T16845] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 378.353248][T16848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 378.455616][ T35] kauditd_printk_skb: 73 callbacks suppressed [ 378.455634][ T35] audit: type=1804 audit(1612024870.727:2073): pid=16850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/208/memory.events" dev="sda1" ino=16194 res=1 errno=0 [ 378.509878][ T35] audit: type=1800 audit(1612024870.787:2074): pid=16850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16194 res=0 errno=0 [ 378.534251][ T35] audit: type=1804 audit(1612024870.787:2075): pid=16869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/208/memory.events" dev="sda1" ino=16194 res=1 errno=0 [ 378.553541][T16849] device bond1 entered promiscuous mode [ 378.579086][ T24] bond2: (slave bridge3): failed to get link speed/duplex [ 378.600637][T16852] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 378.637592][ T35] audit: type=1804 audit(1612024870.907:2076): pid=16869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/208/memory.events" dev="sda1" ino=16194 res=1 errno=0 16:41:11 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 378.747082][T16852] device bond2 entered promiscuous mode [ 378.771986][T16855] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.1'. [ 378.825715][T16855] device veth5 entered promiscuous mode [ 378.834284][ T35] audit: type=1804 audit(1612024871.107:2077): pid=16934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/194/memory.events" dev="sda1" ino=16113 res=1 errno=0 [ 378.875089][T16855] bond1: (slave veth5): making interface the new active one [ 378.914677][T16855] bond1: (slave veth5): Enslaving as an active interface with an up link [ 378.976273][ T35] audit: type=1800 audit(1612024871.107:2078): pid=16934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16113 res=0 errno=0 [ 379.000991][T16877] bond2 (unregistering): Released all slaves 16:41:11 executing program 4: unshare(0x6c060000) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'filter\x00', 0x8a, [0x6300]}, &(0x7f0000000000)=0x54) 16:41:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002cc0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) [ 379.169119][ T35] audit: type=1804 audit(1612024871.107:2079): pid=16934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/194/memory.events" dev="sda1" ino=16113 res=1 errno=0 [ 379.200635][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 379.232785][T16882] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 379.259327][ T35] audit: type=1804 audit(1612024871.187:2080): pid=16936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/209/memory.events" dev="sda1" ino=15757 res=1 errno=0 [ 379.282720][T16973] IPVS: ftp: loaded support on port[0] = 21 16:41:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x88, 0x67, &(0x7f0000000100)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}}, 0x108) [ 379.418718][T16882] device bond2 entered promiscuous mode [ 379.474619][T16852] bond2 (unregistering): Released all slaves [ 379.507031][ T35] audit: type=1800 audit(1612024871.187:2081): pid=16936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15757 res=0 errno=0 16:41:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x18, 0x0, &(0x7f00000000c0)) [ 379.598033][ T35] audit: type=1804 audit(1612024871.187:2082): pid=16936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/209/memory.events" dev="sda1" ino=15757 res=1 errno=0 16:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fe801300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 379.680039][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x11, 0x64, &(0x7f0000000240)={0xfffffffd, {{0x2, 0x0, @private}}, {{0x2, 0x0, @broadcast}}}, 0x108) 16:41:12 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:12 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 379.788221][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f00000000c0)=0x88) 16:41:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x3}) [ 379.898386][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e22, @empty}, 0x10) 16:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000811300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 380.008273][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002440)='ns/pid_for_children\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) [ 380.128237][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2, &(0x7f0000000100)={0x11, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}}, 0x108) 16:41:12 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:12 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x541b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) [ 380.252284][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900fec01300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @empty}}) 16:41:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x8914, 0x0) 16:41:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 16:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390002c81300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x4, 0x0, &(0x7f00000000c0)) 16:41:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f0000000100)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}}, 0x108) 16:41:13 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:13 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0x12, 0x0, 0x0) 16:41:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x8903, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) 16:41:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003e61300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x6, &(0x7f0000000100)={0x40, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @private}}}, 0x108) 16:41:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000040)="200003000000", 0x6) [ 381.148204][T17135] validate_nla: 12 callbacks suppressed [ 381.148224][T17135] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0xb, 0x0, &(0x7f00000000c0)) 16:41:13 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:13 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x12, &(0x7f0000000100)={0x40, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @private}}}, 0x108) [ 381.225459][T17135] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000f01300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x16, 0x2, 0x0, 0xfffffffc, 0x0, 0x1}, 0x40) 16:41:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0xf, 0x0, 0x0) 16:41:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newlinkprop={0x20}, 0x20}}, 0x0) [ 381.523131][T17153] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:13 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 381.579676][T17153] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 16:41:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000fc1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:14 executing program 1: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0x10, 0x0, 0x0) 16:41:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:41:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000240)="12", 0x1, 0x0, &(0x7f0000000200)={0x2, 0x4e22, @empty}, 0x10) [ 381.900556][T17170] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 381.936923][T17170] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:14 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x13, 0x0, &(0x7f00000000c0)) 16:41:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000240)="12b5dbd3", 0x4, 0x0, &(0x7f0000000200)={0x2, 0x4e22, @empty}, 0x10) 16:41:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x20058040, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) 16:41:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390003fc1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:14 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x88, 0x0, 0x0, 0x0) [ 382.339648][T17185] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000240)="12b5dbd3dbb971ac5f9c7915273ded6e60599a1f69a062bc2858f188fca554f82502f53b974c1ba99ed055ac1f942a3af2fa6e87b4b5914609568294f93043e61850200e084ab05957dcd4fbf581841859a8430cef43746b84f9f828e028eadb68d886a5c169debef153c2dd80c0d8f4", 0xfffffffffffffe2a, 0x4054, &(0x7f0000000200)={0x2, 0x0, @empty}, 0x10) [ 382.400504][T17185] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x8915, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) 16:41:14 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000fd1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x11, 0x66, &(0x7f0000000100)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @private}}}, 0x108) 16:41:14 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x31, &(0x7f0000000100)={0x40, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @private}}}, 0x108) [ 382.720098][T17205] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x11, 0x67, &(0x7f0000000240)={0xfffffffd, {{0x2, 0x0, @private}}, {{0x2, 0x0, @broadcast}}}, 0x108) 16:41:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x8934, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}}) 16:41:15 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390080fe1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x8906, 0x0) 16:41:15 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000700)={0x2, 0x4e22, @multicast1}, 0x10) [ 383.118596][ T171] net_ratelimit: 23 callbacks suppressed [ 383.118616][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 383.159849][T17227] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:15 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:15 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0x29, 0x0, 0x0) 16:41:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) [ 383.278060][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900c0fe1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:15 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001380)=@bpf_lsm={0x1d, 0x3, &(0x7f00000011c0)=@framed, &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x74) [ 383.398092][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:15 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 383.492419][ T35] kauditd_printk_skb: 62 callbacks suppressed [ 383.492436][ T35] audit: type=1804 audit(1612024875.757:2145): pid=17242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/218/memory.events" dev="sda1" ino=16290 res=1 errno=0 [ 383.524913][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:15 executing program 4: syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0)='mptcp_pm\x00') sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, 0x0, 0x0) 16:41:15 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') 16:41:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000ff1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 383.628423][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:15 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 383.705904][ T35] audit: type=1800 audit(1612024875.757:2146): pid=17242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16290 res=0 errno=0 [ 383.738833][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={0x0}}, 0x0) 16:41:16 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x2001, 0x0, 0x0) [ 383.884248][ T35] audit: type=1804 audit(1612024875.767:2147): pid=17242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/218/memory.events" dev="sda1" ino=16290 res=1 errno=0 [ 383.963440][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:16 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getaddr={0x14}, 0x14}}, 0x0) [ 384.057302][ T35] audit: type=1804 audit(1612024875.807:2148): pid=17242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/218/memory.events" dev="sda1" ino=16290 res=1 errno=0 16:41:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 16:41:16 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') socket$nl_generic(0x10, 0x3, 0x10) [ 384.118018][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:16 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 384.212938][ T35] audit: type=1804 audit(1612024876.047:2149): pid=17251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/202/memory.events" dev="sda1" ino=16383 res=1 errno=0 [ 384.239318][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a00)={'team0\x00'}) 16:41:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000021300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 384.348101][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 384.370458][ T35] audit: type=1800 audit(1612024876.047:2150): pid=17251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16383 res=0 errno=0 16:41:16 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) 16:41:16 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x0, r2}, 0x10) [ 384.554095][ T35] audit: type=1804 audit(1612024876.047:2151): pid=17251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/202/memory.events" dev="sda1" ino=16383 res=1 errno=0 16:41:16 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 384.743882][ T35] audit: type=1804 audit(1612024876.127:2152): pid=17253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/202/memory.events" dev="sda1" ino=16383 res=1 errno=0 [ 384.889795][ T35] audit: type=1804 audit(1612024876.187:2153): pid=17259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/219/memory.events" dev="sda1" ino=15803 res=1 errno=0 [ 384.925562][ T35] audit: type=1800 audit(1612024876.187:2154): pid=17259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15803 res=0 errno=0 16:41:17 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000031300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:17 executing program 4: sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9400000001010102000000640008000002e308000c001980"], 0x94}}, 0x0) r0 = socket(0x10, 0x3, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 16:41:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'macvtap0\x00'}) 16:41:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000018c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0xc801}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x0) 16:41:17 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 385.098151][T17303] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. [ 385.107625][T17303] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 385.137649][T17306] device veth0_macvtap left promiscuous mode 16:41:17 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) listen(r0, 0xe7) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000cc0)={0x0, @in, 0x0, 0x7d9e, 0x10}, 0x98) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000440)={&(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000280)="ad", 0x1}], 0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="1c000000840000000a000000ff010000000000000000000000000001100000008400000009000000ffffffff14000000840000000100000025008100ffff07002c00000084000000020000000200070000c0000007000000010400008000000000000000fcffffff", @ANYRES32, @ANYBLOB="1000000084000000080000000200000014000000840000000100000000040104ff03080014000000840000000100000017001f000008dbc91c00000084"], 0x100}, 0x0) 16:41:17 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:17 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 385.565928][T17325] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. [ 385.597474][T17325] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000041300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'macvtap0\x00'}) 16:41:18 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:18 executing program 4: sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9400000001010102000000640008000002e308000c001980"], 0x94}}, 0x0) r0 = socket(0x10, 0x3, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 16:41:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000003580)="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", 0xeb1}, {&(0x7f0000000240)="e7f060e0abf217d675962b8102cff247", 0x10}], 0x2}, 0x0) sendmmsg$sock(r0, &(0x7f0000000080), 0x40000000000014a, 0x0) [ 386.509016][T17344] validate_nla: 11 callbacks suppressed [ 386.509039][T17344] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 386.562228][T17346] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. 16:41:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000300001"], 0x28}}, 0x0) 16:41:18 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@mangle={'mangle\x00', 0x1f, 0x6, 0x488, 0x1b0, 0x270, 0x1b0, 0x0, 0x270, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@local, @broadcast, 0x0, 0x0, 'caif0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, '\"-'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'bond_slave_1\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@empty, @dev, 0x0, 0x0, 'sit0\x00', 'veth1_macvtap\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'rose0\x00', 'lo\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e8) [ 386.619057][T17346] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.639699][T17344] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000051300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 386.781033][T17353] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 16:41:19 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 386.857656][T17357] x_tables: duplicate underflow at hook 1 16:41:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@updpolicy={0x13c, 0x19, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x32}, 0x0, @in6=@loopback}, {{@in=@remote, 0x0, 0x32}, 0x0, @in=@remote}]}]}, 0x13c}}, 0x0) 16:41:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x9, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) [ 386.988190][T17360] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 387.062995][T17360] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000061300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:19 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x330, 0xffffffff, 0x0, 0x170, 0xc0, 0xffffffff, 0xffffffff, 0x298, 0x298, 0x298, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ip={@rand_addr, @private, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}, @common=@set={{0x40, 'set\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x390) 16:41:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xaf) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x130, 0x130, 0x0, 0xffffffff, 0xffffffff, 0x450, 0x450, 0x450, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @private2, [], [], '\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "9d4fdb669963f50098b46c5b9d2fdc33c32da53da523bf86616ac5347f84"}}, {{@ipv6={@private1, @remote, [], [], 'syzkaller0\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@loopback, @private1, [], [], 'syz_tun\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 16:41:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x1}, 0x14}}, 0x0) 16:41:19 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 387.459590][T17375] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 387.461873][T17374] x_tables: duplicate underflow at hook 2 [ 387.512221][T17375] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000071300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:20 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:20 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newae={0x64, 0x1e, 0x1, 0x0, 0x0, {{@in=@private}, @in6=@mcast2}, [@lifetime_val={0x24}]}, 0x64}}, 0x0) 16:41:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@newtclass={0x24, 0x28, 0x1}, 0x24}}, 0x0) 16:41:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8, 0x2, @dev}, @FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0xe156}]}, 0x30}}, 0x0) [ 387.832379][T17386] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 387.885785][T17386] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x40}, 0x0) 16:41:20 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x24, 0x14, 0x901, 0x0, 0x0, {0x11}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "0b62f1bad8ad19e947"}]}, 0x24}}, 0x0) 16:41:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000081300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8, 0x2, @dev}, @FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0xe156}]}, 0x30}}, 0x0) [ 388.207809][ T171] net_ratelimit: 26 callbacks suppressed [ 388.207829][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xca, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x14}}, 0x0) [ 388.308357][T17407] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003040)={0xfffffffffffffffe, 0x0, &(0x7f0000003000)={&(0x7f0000002f80)=@gettfilter={0x24, 0x2e, 0x1}, 0x24}}, 0x0) [ 388.377954][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 388.399204][T17407] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:20 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8, 0x2, @dev}, @FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0xe156}]}, 0x30}}, 0x0) [ 388.497710][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 388.608047][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 388.718668][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 388.723736][ T35] kauditd_printk_skb: 50 callbacks suppressed [ 388.723750][ T35] audit: type=1804 audit(1612024880.988:2205): pid=17419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/227/memory.events" dev="sda1" ino=15885 res=1 errno=0 [ 388.784463][ T35] audit: type=1800 audit(1612024881.038:2206): pid=17419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15885 res=0 errno=0 [ 388.821279][ T35] audit: type=1804 audit(1612024881.038:2207): pid=17419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/227/memory.events" dev="sda1" ino=15885 res=1 errno=0 [ 388.849588][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000091300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x71, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) 16:41:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, 0xffffffffffffffff, 0x0) 16:41:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x20}, [@FRA_SRC={0x8, 0x2, @dev}, @FRA_TUN_ID={0xc, 0xc, 0x1, 0x0, 0xe156}]}, 0x30}}, 0x0) [ 388.968336][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 388.976414][ T35] audit: type=1804 audit(1612024881.228:2208): pid=17420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/227/memory.events" dev="sda1" ino=15885 res=1 errno=0 16:41:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x200, 0xd8, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x168, 0xffffffff, 0xffffffff, 0x168, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x124) [ 389.087826][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x9, 0x3, 0x228, 0xd8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x190, 0xffffffff, 0xffffffff, 0x190, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth1_to_bond\x00', 'hsr0\x00', {}, {}, 0x5c}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ip={@loopback, @local, 0x0, 0x0, 'ip6tnl0\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 16:41:21 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x3d8, 0xf8, 0x1c0, 0xffffffff, 0x298, 0x1c0, 0x340, 0x340, 0xffffffff, 0x340, 0x340, 0x5, 0x0, {[{{@ip={@private, @loopback, 0x0, 0x0, 'macvlan1\x00', 'team_slave_0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast1, @multicast1, @icmp_id}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @local, @multicast1, @gre_key}}}}, {{@ip={@multicast2, @multicast2, 0x0, 0x0, 'veth0_to_hsr\x00', 'ip6_vti0\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @multicast2, @loopback, @gre_key, @icmp_id}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) 16:41:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 389.197777][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 389.317755][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 389.331193][T17439] x_tables: duplicate underflow at hook 3 [ 389.348669][T17440] x_tables: duplicate underflow at hook 1 [ 389.360995][T17441] x_tables: duplicate underflow at hook 3 16:41:21 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4a0, 0x348, 0x250, 0x190, 0x190, 0xb0, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'caif0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private1}}}, {{@uncond, 0x0, 0xa0, 0xe0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'ip6gretap0\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@empty, @local, 0x0, 0x0, 'sit0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'wg0\x00', 'lo\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 16:41:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {0x2, 0x20}, [@FRA_DST={0x8, 0x1, @multicast1}]}, 0x24}}, 0x0) 16:41:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'syzkaller1\x00'}]}, 0x30}}, 0x0) 16:41:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:21 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 389.628862][T17452] x_tables: duplicate underflow at hook 1 16:41:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000008100)=[{{&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14}}, @txtime={{0x18}}], 0x30}}], 0x1, 0x0) 16:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) 16:41:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'syzkaller1\x00'}]}, 0x30}}, 0x0) [ 389.751126][ T35] audit: type=1804 audit(1612024882.018:2209): pid=17458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/228/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:41:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000d1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:22 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 389.905549][ T35] audit: type=1800 audit(1612024882.048:2210): pid=17458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 16:41:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) 16:41:22 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'syzkaller1\x00'}]}, 0x30}}, 0x0) [ 390.061776][ T35] audit: type=1804 audit(1612024882.068:2211): pid=17458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/228/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:41:22 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3f8, 0x130, 0x130, 0x0, 0x230, 0x2c8, 0x360, 0x360, 0x360, 0x360, 0x360, 0x6, 0x0, {[{{@ip={@private, @loopback, 0x0, 0x0, 'veth1_macvtap\x00', 'sit0\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x6}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'tunl0\x00', 'vxcan1\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x458) 16:41:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000e1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'syzkaller1\x00'}]}, 0x30}}, 0x0) 16:41:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x2c0, 0x0, 0xffffffff, 0xffffffff, 0xe0, 0xffffffff, 0x228, 0xffffffff, 0xffffffff, 0x228, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, 'gre0\x00', 'vlan0\x00', {}, {}, 0x6}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@empty, @loopback, 0x0, 0x0, 'wg1\x00', 'macvlan0\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x320) [ 390.240720][ T35] audit: type=1804 audit(1612024882.198:2212): pid=17465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/228/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 390.357158][T17487] x_tables: duplicate underflow at hook 1 [ 390.385181][ T35] audit: type=1804 audit(1612024882.538:2213): pid=17481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/229/memory.events" dev="sda1" ino=16375 res=1 errno=0 16:41:22 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000f1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getnetconf={0x14, 0x52, 0x1}, 0x14}}, 0x0) [ 390.501806][T17494] x_tables: duplicate underflow at hook 3 16:41:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_FWMASK={0x8}]}, 0x24}}, 0x0) 16:41:22 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 390.577275][ T35] audit: type=1800 audit(1612024882.538:2214): pid=17481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16375 res=0 errno=0 16:41:22 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@in={0x2, 0x4e22, @empty}, 0x80, 0x0}}], 0x1, 0x10) 16:41:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000400)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@dev, @in=@empty}, {}, {}, 0x0, 0x6e6bba}}}, 0xc0}}, 0x0) 16:41:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000101300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x490, 0x338, 0x0, 0x240, 0x98, 0x98, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x6, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'caif0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x0, 0x7fffffff}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'bridge_slave_0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@empty, @dev, 0x0, 0x0, 'sit0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'rose0\x00', 'lo\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x541) 16:41:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r1, &(0x7f0000001d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 16:41:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2}}}, 0x50}}, 0x0) [ 391.003596][T17517] x_tables: duplicate underflow at hook 1 16:41:23 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@ipv4_newrule={0x1c, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x14}}, 0x1c}}, 0x0) 16:41:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000161300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000640), 0x400012c, 0x0) 16:41:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 16:41:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xb2) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 16:41:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000171300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xb2) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000c00)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={0x0}}, 0x0) 16:41:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="980300002400a309ceac57c7bb5de9f982"], 0x398}}, 0x0) [ 391.626781][T17547] validate_nla: 16 callbacks suppressed [ 391.626804][T17547] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 391.672695][T17547] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000181300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 391.790201][T17554] netlink: 884 bytes leftover after parsing attributes in process `syz-executor.1'. [ 391.979158][T17558] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 392.021252][T17558] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)=@getchain={0x24, 0x66, 0x1}, 0x24}}, 0x0) 16:41:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x490, 0x338, 0x0, 0x240, 0x98, 0x98, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x6, 0x0, {[{{@ip={@local, @empty, 0x0, 0x0, 'caif0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'bridge_slave_0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@empty, @dev, 0x0, 0x0, 'sit0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'rose0\x00', 'lo\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x541) 16:41:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x1a0, 0xd0, 0x0, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @ipv4={[], [], @remote}, [], [], 'veth1_to_bridge\x00', 'vxcan1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@private1, @remote, [], [], 'batadv_slave_1\x00', 'geneve0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 16:41:24 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900001e1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:24 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 392.254567][T17570] x_tables: duplicate underflow at hook 2 [ 392.287994][T17571] x_tables: duplicate underflow at hook 1 16:41:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x9, 0x3, 0x2a8, 0xc8, 0xffffffff, 0xffffffff, 0xc8, 0xffffffff, 0x210, 0xffffffff, 0xffffffff, 0x210, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0xc8, 0x0, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@empty, @dev, 0x0, 0x0, 'wg1\x00', 'macvlan0\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0xfffffffffffffcbd, 0x98}, {0x28}}}}, 0x64) [ 392.309534][T17573] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000240021000000000000000000000000000600030000af"], 0x24}}, 0x0) 16:41:24 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 392.374017][T17573] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:24 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x318, 0xffffffff, 0x1c0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x280, 0x280, 0x280, 0xffffffff, 0x4, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'bridge_slave_0\x00', 'macsec0\x00'}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'ipvlan0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0xe180, 0x4, 0x40}}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @private, 0x0, 0x0, 'macvlan0\x00', 'bond0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@cgroup0={{0x28, 'cgroup\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) 16:41:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000481300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 392.532787][T17582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 16:41:24 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="980300002400a309ceac350762005b3e0887fba61289"], 0x398}}, 0x0) 16:41:25 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x98, 0x98, 0x0, 0xffffffff, 0xffffffff, 0x1c8, 0x1c8, 0x1c8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @private, 0x0, 0x0, 'macvlan0\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) [ 392.681284][T17590] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 392.750296][T17594] x_tables: duplicate underflow at hook 2 [ 392.785017][T17597] netlink: 884 bytes leftover after parsing attributes in process `syz-executor.2'. 16:41:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900004c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0xc0, 0xffffffff, 0xffffffff, 0xc0, 0xffffffff, 0x1f8, 0xffffffff, 0xffffffff, 0x1f8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0xc0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@empty, @dev, 0x0, 0x0, 'wg1\x00', 'macvlan0\x00'}, 0x0, 0xd8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@set={{0x40, 'set\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) [ 392.856849][T17600] x_tables: duplicate underflow at hook 2 16:41:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@expire={0xf8, 0x18, 0x1, 0x0, 0x0, {{{@in=@broadcast, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@loopback}, @in=@loopback}}}, 0xf8}}, 0x0) 16:41:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000003040)={0xfffffffffffffffe, 0x0, &(0x7f0000003000)={&(0x7f0000002f80)=ANY=[@ANYBLOB="240000002e000109200000000000000008"], 0x24}}, 0x0) [ 392.984770][T17604] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 393.010602][T17604] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:25 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000601300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0xb) recvfrom(r0, &(0x7f0000000e00)=""/4096, 0x1000, 0x0, 0x0, 0x0) 16:41:25 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 393.115529][T17611] x_tables: duplicate underflow at hook 3 16:41:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4902000}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 16:41:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001a007399"], 0x14}}, 0x0) [ 393.261608][T17619] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 393.308914][ T8] net_ratelimit: 32 callbacks suppressed [ 393.308932][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:25 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000013c0)=[{{&(0x7f0000000000)=@phonet={0x23, 0x0, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000080)=@hci={0x1f, 0x0, 0x3}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="6b5613e376768c88bbef3cc34ea877c29f8071d0877e374b4fe084549d088dbf66b417bb5d1675c835be795b8d88d1646762bb1f57478bea1ce0e837", 0x3c}, {&(0x7f0000000140)="ecd6a6468f082459d3c0ccd8bbbd8b629d795b4ef5683ce40ddae47c79b50364d6171f0d86feb2287d00ef90379db3f6910ae610303e209dc33476b1ec1a4b1319a4544a32b691c39aca56c794bb592686699704360ad51e041712c07430aacb9708f79567333ca661660761ff7e0d6cfd8851fd22ccf0f7a25d6b9e17ff7b3d213a0d27de85bb180b436aa14297f3f36775e2c704491b5045f15477f00a3c4e5a2089ae82da0033a03dc2e87403602c3e0193ccac58d6018d51aebefc5744b3d65371dcf03de885b07f337b21e7", 0xce}, {&(0x7f0000000240)="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", 0x4d3}], 0x3}}], 0x2, 0x0) 16:41:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000681300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000001d00ab9a25bd7000fddbdf25020000", @ANYRES32, @ANYBLOB="0208000100ff"], 0x34}}, 0x0) [ 393.457970][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:25 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$ppp(r0, &(0x7f00000011c0)='[', 0x1) write$ppp(r0, &(0x7f0000000080)='t', 0x1) [ 393.587558][ T274] bond2: (slave bridge3): failed to get link speed/duplex [ 393.697498][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:26 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900006c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 393.817636][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x10000000, 0xff}, 0x10) [ 393.938711][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 393.970529][ T35] kauditd_printk_skb: 31 callbacks suppressed [ 393.970546][ T35] audit: type=1804 audit(1612024886.238:2246): pid=17649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/223/memory.events" dev="sda1" ino=16376 res=1 errno=0 [ 394.025741][ T35] audit: type=1800 audit(1612024886.238:2247): pid=17649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16376 res=0 errno=0 [ 394.060290][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 394.083775][ T35] audit: type=1804 audit(1612024886.238:2248): pid=17649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/223/memory.events" dev="sda1" ino=16376 res=1 errno=0 16:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0x6}}}, 0x24}}, 0x0) 16:41:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000741300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:26 executing program 1: socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x2c, &(0x7f0000002140)={@local, @local, @void, {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @broadcast}}}}}, 0x0) 16:41:26 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:26 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000002500)={&(0x7f0000000000)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000001180)=[{0x0}, {&(0x7f0000001200)="a3", 0x1}], 0x2}, 0x0) [ 394.178583][ T35] audit: type=1804 audit(1612024886.288:2249): pid=17649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/223/memory.events" dev="sda1" ino=16376 res=1 errno=0 [ 394.207506][ T274] bond2: (slave bridge3): failed to get link speed/duplex 16:41:26 executing program 1: syz_emit_ethernet(0x2c, &(0x7f0000002140)={@local, @local, @void, {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @broadcast}}}}}, 0x0) 16:41:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900007a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 394.347503][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 394.354809][ T35] audit: type=1804 audit(1612024886.618:2250): pid=17661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/224/memory.events" dev="sda1" ino=16382 res=1 errno=0 16:41:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000500)=@setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_BROADCAST={0xa, 0x2, @remote}]}, 0x2c}}, 0x0) 16:41:26 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r2, 0x6628) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 394.497651][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 394.502394][ T35] audit: type=1800 audit(1612024886.618:2251): pid=17661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16382 res=0 errno=0 16:41:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000011c0)={&(0x7f0000001100), 0xc, &(0x7f0000001180)={&(0x7f0000001140)=@delnexthop={0x18}, 0x18}}, 0x0) [ 394.563640][T17674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:41:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@gettaction={0x18, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) [ 394.622428][T17674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.659892][T17674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:41:26 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 394.691960][T17674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:41:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@setlink={0x5c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xde16}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}]}, 0x5c}}, 0x0) [ 394.726883][ T35] audit: type=1804 audit(1612024886.618:2252): pid=17661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/224/memory.events" dev="sda1" ino=16382 res=1 errno=0 [ 394.728808][T17674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.816522][T17674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.838848][T17674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.845614][ T35] audit: type=1804 audit(1612024886.658:2253): pid=17661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/224/memory.events" dev="sda1" ino=16382 res=1 errno=0 [ 394.850032][T17674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.886252][T17674] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 394.897889][T17674] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 394.954421][ T35] audit: type=1804 audit(1612024886.738:2254): pid=17666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/235/memory.events" dev="sda1" ino=16367 res=1 errno=0 16:41:27 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000140081fa8583039a598f00df10", @ANYRES64], 0x24}}, 0x0) [ 394.997667][T17690] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 395.021222][T17690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:41:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000fc1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xa4, 0x210, 0xffffffff, 0xa4, 0xa4, 0x3ec, 0x3ec, 0xffffffff, 0x3ec, 0x3ec, 0x5, 0x0, {[{{@ip={@multicast1, @empty, 0x0, 0x0, 'bond0\x00', 'wg2\x00'}, 0x0, 0x70, 0xa4}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @private, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa4}, @REDIRECT={0x34, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @loopback, @gre_key, @gre_key}}}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'ip6tnl0\x00', 'ipvlan0\x00'}, 0x0, 0x94, 0xc8, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}}]}, @MASQUERADE={0x30, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast2, @multicast2, @gre_key}}}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'macvlan0\x00', 'macvlan1\x00'}, 0x0, 0x194, 0x1dc, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "6ca5e3c347acf06f9439a8238e311365cd3ec2ddc1dd5f3b616438deb7ad7b2210fe6b30fea3fabf256552dbc9d557059e5d7bca41a2c6d767c1c0f34475d27ab373b15c5b025923a6be41d826d67aa2224f73a0e2571215ab44ac1f06969fc994f8516f45e399f4b880ca555a04bf2967c89af303e4b209e24760f1edae215b"}}, @common=@inet=@iprange={{0x64, 'iprange\x00'}, {@ipv6=@dev, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@local}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@loopback, @ipv6=@local, @gre_key, @gre_key}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x12b338015f3c8a38) [ 395.051744][T17690] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 395.103073][ T35] audit: type=1800 audit(1612024886.738:2255): pid=17666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16367 res=0 errno=0 [ 395.145617][T17690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 395.182763][T17690] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 395.232365][T17690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:41:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) [ 395.278327][T17690] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 395.314981][T17690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 395.340815][T17690] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 395.360849][T17690] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:41:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@nfc={0x27, 0x20}, 0x80, 0x0}, 0x0) 16:41:27 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0xc1, 0x0, 0x0) 16:41:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 16:41:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000fd1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:28 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:28 executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 16:41:28 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="992ab4b46a26", @random="a614eb8fc3e3", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @empty, @remote}}}}, 0x0) 16:41:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:28 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000002540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fbe6e2cf", 0xef}, {&(0x7f0000002180)="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", 0x1e7}, {&(0x7f0000000040)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab8bf4f2e71756d4eec653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093093989b501de5ac57260489bb0cb133344", 0x8f}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446f51d362bc042cb4eec2949f6fc8ab344c88e0fcf70e1fcc9e0e5ba34454e69a8b6bea429", 0x3c}, {&(0x7f0000002580)="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", 0xc44}], 0x5}, 0x0) sendto$inet6(r0, &(0x7f0000000100)="d87f10581a0990a277817d4ce7ddf6eca48dee090995bed7b8a988dd", 0x1c, 0x20101, &(0x7f0000000240)={0x1c, 0x1c}, 0x1c) 16:41:28 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 16:41:28 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x49, 0x0, 0x0) 16:41:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000002c00)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000002780)=[{0xc, 0x84, 0x1}], 0xc}, 0x0) 16:41:28 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 16:41:28 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:28 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:28 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000080)=@un=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000140)=[{0xc}, {0xc}], 0x18}, 0x0) [ 396.392405][T17746] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 16:41:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x101) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)='k', 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x248}, 0x0) 16:41:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:28 executing program 2: syz_emit_ethernet(0x22, &(0x7f0000001080)={@local, @empty, @val, {@ipv4}}, 0x0) 16:41:29 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@broadcast, @local, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1, @broadcast, @loopback}}}}, 0x0) 16:41:29 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c305") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 396.799538][T17770] validate_nla: 17 callbacks suppressed [ 396.799560][T17770] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="8c56ebadc1e9db8fc91ff3f389f25211ce92ea02427368e89f80c7bb739fd8597f3f2ea4ef8e9a86536a308fe1cd73b3eefe3cf05a569f97c8d13c5092ff0e4f2bebd5035a62fd4b377dc5d68704028dcd0e7290627608b16614672154017efdedc70e693ae6ab7fe2f270927f6784803579aad361c29167baf9988203990e30ac12f50ac8d5e3f27af128dd554435c159a493734f7bd95c08", 0x99}, {&(0x7f00000002c0)="809e11522ca5c832b27243f673fcd740", 0x10}], 0x2, &(0x7f00000003c0)=[@cred], 0x18}, 0x0) 16:41:29 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}, 0x0) [ 396.893920][T17770] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:29 executing program 1: syz_emit_ethernet(0x11c5, &(0x7f00000018c0)=ANY=[@ANYBLOB="ffffffffffff9850794405ec86dd"], 0x0) 16:41:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000002340), &(0x7f0000002380)=0x18) [ 397.183389][T17788] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:29 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:29 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008"], 0x0) 16:41:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000000f00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:29 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @empty, @val, {@ipv4}}, 0x0) 16:41:29 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000001080)={@broadcast, @remote, @val, {@ipv4}}, 0x0) [ 397.632421][T17800] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x8) 16:41:30 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0xfffffe79, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 16:41:30 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000001580)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000001500)=[{&(0x7f0000000300)="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", 0xff}, {&(0x7f0000000400)="dd2069ff47d273e10d6350b5ff908ef063cc15375a9993555965dd974d2fd848c849512a8db5dc21d3d19dbf1b2d5b7d0ca4baeab15e887b762f2c88bde20b3c8a315c12d1b04ddb49041a110e6988a65e8699e68c9e73be0d6b1f52727c82915b4162449f6f04000000000000002fabbd3ce9fbf28fa1b717", 0x79}, {&(0x7f0000000840)="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", 0x361}], 0x3}, 0x0) 16:41:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000002500034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:30 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000002540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fbe6e2cf", 0xef}, {&(0x7f0000002180)="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", 0x1e7}, {&(0x7f0000000040)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab8bf4f2e71756d4eec653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093093989b501de5ac57260489bb0cb133344f3", 0x90}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446f51d362bc042cb4eec2949f6fc8ab344c88e0fcf70e1fcc9e0e5ba34454e69a8b6bea429de", 0x3d}, {&(0x7f0000002580)="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", 0xc5e}], 0x5}, 0x0) sendto$inet6(r0, &(0x7f0000000100)="d8", 0x1, 0x20101, &(0x7f0000000240)={0x1c, 0x1c}, 0x1c) 16:41:30 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 397.977776][T17815] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 398.022824][T17815] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 16:41:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000002c00)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000002700)=[{&(0x7f00000001c0)="c8", 0x1}], 0x1, &(0x7f0000002780)=[{0x14, 0x84, 0x1, "6f4d16da88"}], 0x14}, 0x0) [ 398.073026][T17815] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000005a00034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:30 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:41:30 executing program 4: syz_emit_ethernet(0x1e7, &(0x7f0000000280)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:41:30 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 398.337243][T11158] net_ratelimit: 26 callbacks suppressed [ 398.337264][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=@in={0x10, 0x2}, 0x10) getsockname(r0, 0x0, &(0x7f0000000040)) 16:41:30 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 398.433377][T17842] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 398.486901][T17842] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 398.549564][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:30 executing program 4: syz_emit_ethernet(0x31f, &(0x7f0000000280)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:41:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:41:30 executing program 1: syz_emit_ethernet(0x5c9, &(0x7f0000000280)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:41:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 398.677363][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:31 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 398.787225][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 398.815457][T17866] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 398.840595][T17866] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:31 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000040)=ANY=[@ANYBLOB="fffffffffeff00000000000086dd606c667f00180000000000000000edff0000000000000000ff02"], 0x0) 16:41:31 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 398.897184][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013e8004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000002540)={&(0x7f00000000c0)=@un=@abs={0x8}, 0x8, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fb", 0xec}, {&(0x7f00000002c0)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab32c653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093", 0x77}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446", 0x18}, {&(0x7f00000003c0)="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", 0xeee}], 0x4, &(0x7f0000002400)=[{0xd8, 0x84, 0x0, "4e39a9a9870d7343449f00771c6926642c75026316e4ad12befb0a8968c55bd1b3ff3b1b9521de4a62636e7877e625928840ff4277b705ad4ff78267d882442ffb378049593711fb92725e9e56b1f584c98e47ceb66a0334e34f6d8c3c6d2cc6d5b748fbd367613c4c0e04a3a2aa49d6654a3425399b2a0ba9e718fa006178c62e016d6a4aa8a64e07b96322965cbf52ff3d323f8ad9a92d070b6c25436f859336be2995b2157ea924e34496610804207bd06899865c7cece30846dd7bb390c2ce75cb59f373b9a39efc0280"}], 0xd8}, 0x20000) 16:41:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x101) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)='k', 0x1}], 0x1, 0x0, 0x248}, 0x0) [ 398.995589][ T35] kauditd_printk_skb: 58 callbacks suppressed [ 398.995609][ T35] audit: type=1804 audit(1612024891.258:2314): pid=17872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/242/memory.events" dev="sda1" ino=16367 res=1 errno=0 [ 399.035664][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 399.072066][ T35] audit: type=1800 audit(1612024891.258:2315): pid=17872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16367 res=0 errno=0 [ 399.107336][ T35] audit: type=1804 audit(1612024891.268:2316): pid=17872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/242/memory.events" dev="sda1" ino=16367 res=1 errno=0 [ 399.158674][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 399.277213][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000002540)={&(0x7f00000000c0)=@un=@abs={0x8}, 0x8, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fb", 0xec}, {&(0x7f00000002c0)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab32c653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093", 0x77}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446", 0x18}, {&(0x7f00000003c0)="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", 0xeee}], 0x4, &(0x7f0000002400)=[{0xd8, 0x84, 0x0, "4e39a9a9870d7343449f00771c6926642c75026316e4ad12befb0a8968c55bd1b3ff3b1b9521de4a62636e7877e625928840ff4277b705ad4ff78267d882442ffb378049593711fb92725e9e56b1f584c98e47ceb66a0334e34f6d8c3c6d2cc6d5b748fbd367613c4c0e04a3a2aa49d6654a3425399b2a0ba9e718fa006178c62e016d6a4aa8a64e07b96322965cbf52ff3d323f8ad9a92d070b6c25436f859336be2995b2157ea924e34496610804207bd06899865c7cece30846dd7bb390c2ce75cb59f373b9a39efc0280"}], 0xd8}, 0x20000) 16:41:31 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 399.304258][ T35] audit: type=1804 audit(1612024891.448:2317): pid=17877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/242/memory.events" dev="sda1" ino=16367 res=1 errno=0 16:41:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130e014700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:31 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv6}}, 0x0) [ 399.385096][ T35] audit: type=1804 audit(1612024891.518:2318): pid=17883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/233/memory.events" dev="sda1" ino=16366 res=1 errno=0 [ 399.416177][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 399.547302][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 399.551325][ T35] audit: type=1800 audit(1612024891.518:2319): pid=17883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16366 res=0 errno=0 16:41:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000002540)={&(0x7f00000000c0)=@un=@abs={0x8}, 0x8, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fb", 0xec}, {&(0x7f00000002c0)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab32c653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093", 0x77}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446", 0x18}, {&(0x7f00000003c0)="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", 0xeee}], 0x4, &(0x7f0000002400)=[{0xd8, 0x84, 0x0, "4e39a9a9870d7343449f00771c6926642c75026316e4ad12befb0a8968c55bd1b3ff3b1b9521de4a62636e7877e625928840ff4277b705ad4ff78267d882442ffb378049593711fb92725e9e56b1f584c98e47ceb66a0334e34f6d8c3c6d2cc6d5b748fbd367613c4c0e04a3a2aa49d6654a3425399b2a0ba9e718fa006178c62e016d6a4aa8a64e07b96322965cbf52ff3d323f8ad9a92d070b6c25436f859336be2995b2157ea924e34496610804207bd06899865c7cece30846dd7bb390c2ce75cb59f373b9a39efc0280"}], 0xd8}, 0x20000) [ 399.592034][ T35] audit: type=1804 audit(1612024891.528:2320): pid=17883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/233/memory.events" dev="sda1" ino=16366 res=1 errno=0 16:41:32 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) [ 399.698353][ T35] audit: type=1804 audit(1612024891.728:2321): pid=17887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/233/memory.events" dev="sda1" ino=16366 res=1 errno=0 16:41:32 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001302034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:32 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:32 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000002540)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a5370552417", 0xa9}], 0x1}, 0x0) sendto$inet6(r0, &(0x7f0000000100)="d8", 0x1, 0x20101, &(0x7f0000000240)={0x1c, 0x1c}, 0x1c) 16:41:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000002540)={&(0x7f00000000c0)=@un=@abs={0x8}, 0x8, &(0x7f00000023c0)=[{&(0x7f0000000140)="8b2ae7768e5899091d49ae8e9245a46d4a343ce39ea2e79b9335fada86a454de79be8767a3ccb15a8f4b905176a800733a055154211d8789c2564bfda8fd99d142281b4c05522d8d8a04dbb044812584984aacbc23718413cc7ae7adb5bdb225c9461b5ea661db3a95854f96c9402bbc51d3a7a6b5ada52ceb8b81e0e049bfb9100df50d70a2deff5143a0a7ebfb83f62f4b594964e6511994b75fe2ba3cf317c9c62d1a537055241734b2907e894ecda1626cdcec976c6e4379e2c0202f003925af12a3dcc5dd88c7bb77ec6910ed48ce00362d75f10786dbf7b148a7a61f5c19fe41084e543c11ea07c5fb", 0xec}, {&(0x7f00000002c0)="36d39b99ac2e407b38c7801148c22461a59009b72076a47600b05845236a6cb0b45795e2b88d8d4a8f3545de473b6b6560d9a1c7c673cc703e5e4c6f9360ab32c653b07186fe90b5b1d6d095edf1aff884f780e82a4876fe98b59a3800cb06b69c3c8f87883ad1120ecaf5c0371966cf14338816836093", 0x77}, {&(0x7f0000000380)="15798d25c42c0e94806407dc53ca7ef9084e7ab62f2ff446", 0x18}, {&(0x7f00000003c0)="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", 0xeee}], 0x4, &(0x7f0000002400)=[{0xd8, 0x84, 0x0, "4e39a9a9870d7343449f00771c6926642c75026316e4ad12befb0a8968c55bd1b3ff3b1b9521de4a62636e7877e625928840ff4277b705ad4ff78267d882442ffb378049593711fb92725e9e56b1f584c98e47ceb66a0334e34f6d8c3c6d2cc6d5b748fbd367613c4c0e04a3a2aa49d6654a3425399b2a0ba9e718fa006178c62e016d6a4aa8a64e07b96322965cbf52ff3d323f8ad9a92d070b6c25436f859336be2995b2157ea924e34496610804207bd06899865c7cece30846dd7bb390c2ce75cb59f373b9a39efc0280"}], 0xd8}, 0x20000) 16:41:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001303034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:32 executing program 1: syz_emit_ethernet(0xfff, &(0x7f00000000c0)={@local, @local, @val, {@ipv6}}, 0x0) [ 400.068149][ T35] audit: type=1804 audit(1612024892.338:2322): pid=17914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/243/memory.events" dev="sda1" ino=16376 res=1 errno=0 [ 400.162318][ T35] audit: type=1800 audit(1612024892.368:2323): pid=17914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16376 res=0 errno=0 16:41:32 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @empty, @val, {@ipv4}}, 0x0) 16:41:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:32 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:41:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000e40)={&(0x7f0000000500)=@un=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000b00)=[{0xc, 0x84, 0x2}], 0xc}, 0x0) 16:41:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), 0x10) 16:41:33 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001305034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 16:41:33 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @empty, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="80f0a1e3de67", @broadcast, @remote}}}}, 0x0) 16:41:33 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 16:41:33 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[{0xc}], 0xc}, 0x0) 16:41:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001306034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0xc) 16:41:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x101) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="f7", 0x1}], 0x1, &(0x7f00000003c0)=[{0xc}], 0xc}, 0x0) 16:41:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:33 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2e") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x4, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 16:41:33 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000001080)={@local, @broadcast, @val, {@ipv4}}, 0x0) 16:41:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x800, 0x0, 0xe68a}, 0x10) 16:41:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001307034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:33 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$sock_int(r0, 0xffff, 0x1014, &(0x7f0000000000), 0x4b) 16:41:33 executing program 2: syz_emit_ethernet(0x149, &(0x7f0000000280)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 16:41:33 executing program 4: select(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0x3}) 16:41:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001308034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:34 executing program 2: select(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0x3}) [ 401.932461][T18008] validate_nla: 16 callbacks suppressed [ 401.932490][T18008] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:34 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:34 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000001140)) 16:41:34 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000080)={@broadcast, @local, @val, {@generic={0x86dd}}}, 0x0) 16:41:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001309034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:34 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 16:41:34 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 402.503568][T18025] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 402.557185][T18025] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:34 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000000)=0x3ff, 0x4) 16:41:34 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:34 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000001640), &(0x7f0000001680)=0xc) 16:41:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="d174655e7dee", @val, {@ipv6}}, 0x0) 16:41:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:35 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv6}}, 0x0) [ 403.004308][T18046] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 403.055780][T18046] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:35 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 16:41:35 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:35 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 16:41:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:35 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) [ 403.447011][ T51] net_ratelimit: 33 callbacks suppressed [ 403.447033][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 403.483187][T18062] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="2efe12953bec5c000053350ef7aa98949e73928f1b6ff04e56330de163194527", 0x20) 16:41:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x58) [ 403.521726][T18062] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2efe12953b3c689c48533531f7aa984c", 0x10) 16:41:35 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 403.597136][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130d034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 403.707558][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 403.817011][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:36 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) [ 403.927001][T11158] bond2: (slave bridge3): failed to get link speed/duplex [ 403.953510][T18092] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) [ 404.047180][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000040)={'syz_tun\x00', @ifru_mtu}) [ 404.110009][ T35] kauditd_printk_skb: 54 callbacks suppressed [ 404.110028][ T35] audit: type=1804 audit(1612024896.378:2378): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/248/memory.events" dev="sda1" ino=16376 res=1 errno=0 16:41:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 404.164030][ T305] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) 16:41:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 404.306978][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 404.360592][ T35] audit: type=1800 audit(1612024896.418:2379): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16376 res=0 errno=0 [ 404.362587][T18109] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0xff50, 0x3e9, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0xffffffffffffffff}, ["", ""]}, 0x38}}, 0x0) [ 404.504352][ T35] audit: type=1804 audit(1612024896.418:2380): pid=18098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/248/memory.events" dev="sda1" ino=16376 res=1 errno=0 16:41:36 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000000080)={0xfffffffffffffffe, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 404.567111][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x7000000, 'drbg_pr_ctr_aes256\x00'}, 0x58) [ 404.676931][ T8] bond2: (slave bridge3): failed to get link speed/duplex [ 404.749623][ T35] audit: type=1804 audit(1612024896.488:2381): pid=18103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/243/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 404.814619][ T35] audit: type=1800 audit(1612024896.488:2382): pid=18103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16378 res=0 errno=0 [ 404.874442][ T35] audit: type=1804 audit(1612024896.488:2383): pid=18103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/243/memory.events" dev="sda1" ino=16378 res=1 errno=0 16:41:37 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000130f034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x40000}, 0x0) 16:41:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002f40)={&(0x7f0000002b40)={0x14, 0x0, 0x78d51ea3c38838bc}, 0x14}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:41:37 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:37 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'lo\x00', @ifru_mtu}) [ 404.980406][ T35] audit: type=1804 audit(1612024896.528:2384): pid=18103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/243/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 405.076490][T18134] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 405.080561][ T35] audit: type=1804 audit(1612024896.548:2385): pid=18105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/248/memory.events" dev="sda1" ino=16376 res=1 errno=0 16:41:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x2, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) 16:41:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) 16:41:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001310034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3d}, 0x0) [ 405.321207][ T35] audit: type=1804 audit(1612024896.868:2386): pid=18118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/244/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:41:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x2}, 0x0) 16:41:37 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 405.545241][ T35] audit: type=1800 audit(1612024896.868:2387): pid=18118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 16:41:38 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000040)={'syz_tun\x00', @ifru_mtu}) 16:41:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) 16:41:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001316034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) 16:41:38 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)='.', 0x1) 16:41:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x14, 0x14, 0x101}, 0x14}}, 0x0) 16:41:38 executing program 4: socket$inet(0x2, 0x3, 0x5) select(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000240)) 16:41:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001317034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) 16:41:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 16:41:38 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:38 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:38 executing program 4: socket$inet(0x2, 0x3, 0x5) select(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000240)) 16:41:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 16:41:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001318034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:38 executing program 4: socket$inet(0x2, 0x3, 0x5) select(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000240)) 16:41:38 executing program 2: socketpair(0x10, 0x2, 0x7fffffff, &(0x7f0000000280)) 16:41:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000131e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:39 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:39 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000040)={'syz_tun\x00', @ifru_mtu}) 16:41:39 executing program 4: socket$inet(0x2, 0x3, 0x5) select(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000240)) [ 406.962708][T18212] validate_nla: 9 callbacks suppressed [ 406.962727][T18212] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 407.031339][T18212] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 16:41:39 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001348034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x43e}, 0x0) 16:41:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000a00)="5a3bd3da057c7591fec467b64ec08e31b125b06f6264b24b944fe8e46b0abf7a325e91a26efb98fcbe4fdd457a800ad02e1da1070981c395ff147cecd6a5338f2574dc7edecda2714901bfac194d547700cfbbef25ad427c2cc2d9de1af1c94998b5d109cf2f79cdbc9a0f1cf282fa5b5f721c41e7cd5c86e5af8cd20c7f62763a98c8e30d8aabdec6339907fb9d08283d8f596b3a0b941fed00abc257b46986057821daedf84b6bae3220443ca4d695f8e3a4a8c1efe4b133d3466fe48e868524982dc65713d8e56f18b49b54c477d5f60a61c1edccbf291b96e60f86ba00f7058a8e82b3e3105968f84828c159dda4c1efe09ae3d2347294df6b2f415ef032a945e5faf54b0b7e9c24f44ff31bd5275a7ae92d718e21f28e752748ddec5466cb470fc56f5f12fb0855c12b7a5699c3bb1c4eb78a48bfd36ac01fbb9ef95659ed06e4cd5a8e39b53ab1ab70487f0abe8c2d8e97a08270dfc2f292b17a7d50d53dfb011086dd754fc103c59669faeb04eaab7d6cd4e53cca65f014b1e76fafbacd140c4475a059b38ae3eb6f7782ce98baf445c931d1440dbe1e9708ff39f8f732e528ff9be9421520d686accbe45c71371dd2dc01a664000a4e95aca482f9b515d06348dd3b6e31538508a4862bd977dbc511c95c3a116f397e95ca3b1940b45ffc9e3ed1f2bbce4f234d9547185994fc9504c4bac4ec36235d8ede315a314d0e73af36d84d68957eb2b9680dbcd5549673fe5ca1a6408dde087908cea45815982329fec22a6ae769ccbd74d9f1b50dd713cf0add75a503f31c16c597665a08a6599b87a2f9df665529adf6ff207cb3b05a1fc5752b5b77e3d1ebb94d529565f95f07941315146fa32aa8e07109ae01fbed6a647538290a9eaae831a128751e637c4dec686de1fb1942368e31f23fddd76e1b16c5393558c707d0c214aa11f30c96722397d3438e0f7dcab05554b1f9c7edd44eacdd656ed8f9b4a09e942ef4270827a10c7a73219a1a6b872f9ede592831114a1639c154e1e0581423e9a11310a3a81e540718d8a2d385916843427d44b967d9496611a9cefbe5a44ab09e5f0d1e6ff1bc062f9a6844a1cb8208ef2930b31c7025bcff9c68c4229ef69442f9ecc33a556f7a8bafa692a3cdcd46794e20f9e417cb8254857d4fdb442fd9e9bb98669582eeedce0efc3b44d71f750b1bf786f37f5ad76c7345c158ee54f05326f99655151080a9f89bd821ded4227aefdfe38d79223408a2e4cb7285cdc5707a480ab2dac38733316060d562873aec303ab133d83427404cbb39fed488884b2de4bb3c76a4feef7009727718411e689e209a2e12a507b20580a12e452ea629eef5c8fd5a2c222d27729d901e9b8999189fa575fc874945d811afcb53f6de58ac6d357587eb70ec4c37cd4fcf96f1815c07566cdaf09915d6f639db85ca613b74626db802c38c7c318055a8b189a622d67ddffa7198210639e8fdf1464d7cbe04fa93fcf9ac94ee52217168a9c9d00c1dbffe8c969081e9c42e3b5ddee70dfbd94abf38b6098750a4a9cbe5235d896ee5509c2a5046da24f26b8a1a763150c21a8fa7bdcbcdc36dea26ff2965ab2944e99af7f2f6bb510e870015e0f0822c38121309e250a48d1b716fa2404b7782d3488e18158f4f698a264e76256dc9e242928ad639d6d2148d9675682ffdf5043bfb870481b1a10075d341f42cc56bd78462fe282e4128b977562f2882a04edda724db5f2c7393562cccd15acf314711a8fc95ed91dd6968445f1b473dfd4536bc301b894b3ac120c8b453078f6379a8e58df27a7904ad33272454c0ea31d97c5b026137bb65e029fb542b35f64645b79b49dfa48107ec0c43a153548520e42cd5e6360cde13326ee8d0327a858c926be41cc1681de19ea8598c97b4ccc621298a3f93b298811c1b311f9f8f702fd4fce97b04c08ee75776758c360d559d7e217af2ceab18e388cc5fd5af499d20faee2331add44c62714600b419a3e3ad36fc7b590cf720add2f81399c14ae67024603d6bae249b037d1e778662934e45e2d5fd3a197d5693ad3f87d257cd5783ed482b3491dc1991324af811ab63d300e8e5c763468ca15176305c5b21a2ae5066bf57f02f8e3af0fac7888c2ca7bd576c3342e3aec8c6c504aab5ff98191cc5859064a1ec57fff039b190d226cb20d082e2460527218c1f0c5f39a7c6830518d7036a50cb5f92e8870e516df2bb5391d0dfcf3bee54a0085031e555501fa77cff3dd8431bac93c9831eba209d82491b7e13c7ec722e420d7ab37f50c6733997275d9dedac4cb55c0e984cb1744740f9d6f7d2665aff3127085daf5d8a2853a31a3d267586caa4c478761e814718f266f1060ce230396bdce35a0b2fef7781caba32d6c51845ad2a35229cbc64a66e44f993468e08d974e2dea210e2107d097f95a4ef8de1d64823571a29aed2813303ad3232c52b84d3d5e340d1f9268b53562d20f8da6d28dd46df92a2cbfd62ed26d33907e509441e895985edd60352148739aec5ccb9e89f99da91402a68c81711cac18ceba56d08a1f1ae84d2c652908ba70645452e5663b4d883b668d0492354f57f2746b0f8d2253eb4db23c8c1ed9aa378db642980310a719491009d8d1decb3bc6df3cd67e755e94bd20e272ce5c3c363a0ba66ec32ef41a1d7d410b0a412138360ff2468b1968509ec78e66a8d86b07141b10adc061e334cfe03b20f4837cff0235c8164ddd632604751fbcca485d1d523cd4a4d1a09853de7a3e3bc3da3f445716978b1c7ca4567423c4cd5d54340e20e4a4e97c0cc58532e47ef661a88a11097bd38f9bad1efb6f0d8f76fa22df2d063df9a78e6451be3f4eb9c09398a52a87a05d28dd6af3ef22c6316e4d2128611a5b609a4489ca8d00b50695197f65c37e8de4a0f7c4dd8616497f8c04b055af5f61ec8befe3aeceabf2f359a5378706e6a8bd2cfa8d9e535ded80a7e998a134c6f57d5eae8ccecc74107ca851859cde55b8a2def4636b42693291ab952a27d175d5a4bcd5720067a1df9d947fd68a50a69c8dbf30b3e4f7a499e5716c87c157ed42b5eb65039a5d677df333afc5d657fad3006abe4565018a14e23598c4875a8343f08152e60f4ed80e4d444e7239899c196fb8d5b95bc058dad161c53650092321db52e0dd5629218b6838cceab3a1349694980bec92907b1b96f430935c5c7851e88ddbe32470e3737f0e9d69333feb394190555caa02712e4621ed4f4bc296e924a7fb80bd2dbaf91098529cca5cc9fad907e86273eb9b21ccd73d12d9b4cc4cab59333d368011036192bc3f9378cbb22a29c93e17bbee3e6ba89f080996948d7b3af16876c8701dc3af8a46dc31b32789cf3744252da9d445adf0c510793b21472cd8820c8f451fbf131cb1d64090303c7536e49ce8a4ce44c6ad3a46eea50971f3ea8e4c105e319e77b6bbdfb3dc4852431db8fed80f93fa021d49fd541e4d6b038b655eae1193edc40463f04e39c01a6ef6a18acc7fba811b908ab87395328822e7c9c3694da9e5dbb2e66e86091568666c492df4f0aff2111127e1d7bc454454f9ef115280b63c9b87bd925e924078365b3f0938e603304956fa76857ccfee1340edb0787cbf6a09fc1c8392d92e643124afd731417fb66dfc869aeb417ed44514bde7a6d00a283e8fc723e330afdc47064228a59da07a6bb59b6c99b6b559a88e2afc56fa97ff0f4134328136e1b65895f547a98eb18c10d0b2b7e69d23c1de4901d125e2a0795f1d56989f072fc24ee1a61822c8c49bb3d3625125b27ccc1c58e5a338eb9827f9fe34413d9752267c7188d19a0deee9881057f0a6b9599700dfec8572e88c4c5b97aa28531cb12c6f66e6a7c7e0b33f72fe3c356623de7cefe0f7192cac0d5f00e21adb6f0022e1b8e6ccc177f3231b5253744e4bc8cf00dd79f6969562e3e391e6f78fecaabcbff29a6ef0ab7772ebd5500f08159292d1cb1c6a8de13733478ebb907402aedc78b3cc9cbe19534e212f404c25a6b4b471450e7ac908bcb9b88348b037cf71d616d021a74e62c2670e58c1dc23ac45292da82a2ac31c291cbf17c4e8db47c2f845af05282d7d8540c9ec4e8cf6c96a6b99a1d9531302929f59dead9b1f81e1662bba30cced6c57af87b671f71b54dbb288f57c183639263a5757f366db1ce7dc96855a709181675740b6f207cad5cb029d27d4f84151a7d18e73deec99b3de4318de44f50a2f473e2a3d20b823537453edf4f16365ecd79fc65c24c47cc5965043b3c47defbdfae0c3fc4b390980687216dc3722ed2fb991aac20e33382a942b121e9678de96395cf5f0ebe45b9e2a15c03b57f90d124f5536f039405d41d5acf1c86c9736fd9bc84ee80974041945370f508d9ff60bb34929d415aed22ebc2d2aed9e3c6fc9b8bedac9bb3a87e414b62b10cf4309df290ef29616542ac5ecbd5f88d73353b91f595616023b7e4807b10b969cb5a09a2cef5ac5f8c21fdff7de9cbe41b0846472490d466538865100b5bb40682873cd667fde077da5da5c04a8098f37a4bdc3e9a0960ce3500091d2318524a056d79c29665681eb348901c7715b331d2c91d00323e25f2686d326d7901161d0161aecdfc09d4793b9473a8346a2dfab09863eb16353a9be75fa2f32527cac9977a6db5612dac2208c6690e29efe985508ccfb0e9319bb29fed9e1743b2be20b1bebc72275b88dab0447685f567527120fb0fdc57ec8252c7eb68110428ce2cf75c3d30afad92102d4d3043c26efe62d4f17f92ece9b7d5853faaafdccfa94e424c1c2bd9c40b1c13b1732a0c4b8c57fbffe814214d452a51e69cd58be787bf365149aec56d811a6864e2d148064d8234adf03e84e0e9b121e78d4946923ab391ab9412e2adc46069d0808271795ecf7b68b363474d8afd3a1422f75225023a9fab0d6d0a8c85af5bea7d38a17e08a5cddd46cdcf342950ee20df36d51233496202f246f5d028fea3618b49d035a422ecd82729c67870f4eaf1e22ed0c3c2ef7d132bc6908bb47009992d20bd8e7d72d2b091e2296d9dcc9fb5231a37fb6c380966a64cc8d16e897b3b2a8249d0970d7054b32f54ca2d945ce67cbcc3d4b669a87fc888d9bcafcf9a9345cd163f65160bf33bec3cef7145a1c654b8652f327091a7ec18ad990a9a0808e9ec60feb810db2cb0b2fa39d3ca61cc9415860f010be8cc23dd689051d92f2604f6a5a86e5032a52b0632b4ed185aaaf835413e0e2782946824d02222449e44d34f1cf56b1e798e4620ff8f487709e811cbe5228553ff185a445370aff040e673edcd4bb27670da3c03036beca9663f6bf8495be7d4ffd67f14c27b93b672ec1f5d20a1f74e52a94a17d6ca367c86097196a4843b26a929ae8e27a6f04a5290b12cae68b73d3b5a51c5d0f15aea7012b651380fd983e04c732748928c51152fd29a30eb2c3f022666d98aeec3d7f7ada8a4845fee996f1e22b03929436928cf8eb027f0ce67020b6adfbe1358972e3d876af5e009fc9178a89d1ae912790c0bd47ea74eb483fc6057d64a484baa88a71f2c9e1f1e6ace989fd70d8313830ed752897cd9802206f7a97bcaeae218c59737081f73d566ac70d6dab3c5c41b668beebba33fa0e3180127550d88f8a78349f4af1fc543ae6b96b920e50bab5c297c121d1771798152e82d7b92989a00d7dcbbfed4540ae8c7b98902708486550e4811b3fe97dd1c81ef1504f5ab2db59d003666ef5b5488f9e6bb2dc59b2aa04c068ce2100353", 0xff1}], 0x1}, 0x0) 16:41:39 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:39 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f0000001680)={&(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="980000000000000011000000070000006d5a25eed127deb85e08bb3c456e187fb6e89f0c75aa596ee482a18213c034ad5543d75f3415a55d3a7e40eedd65f0dabbfb017c5c2262464a1ca11c209de8013e3e4121dfb150ce82e52fe2d8501ca741041c4fe266af51c8356e32a713add654c1b85197876d25fc0c5483d370d8c050f70d1e3822b87367636cf5b5121b14e277475e24b0005f28000000000000003a000000030000002435d47aac6729ef712f23353b705b8ba469664997000000b00000000000000034fd4bb006000000e6921ad997a8993c52f03d7955bcc2cdaa938bd27d528d2224302b08b5845ae666a9bca672bebef126ed50e0ea670c4a4279533f2f5ef01924489e5b88fcfe35dccf0e229646cfc5f84065103814cd7efaffb043fde2ce003f7f54e65390759e7b73a9b4fe29477243a991125ef6e9e7b055fefd8a0d5a2f03e55767561bbe29d586b0050000000000000052eb9996b26965a1fe339a8a79b2c99bca9f958b0038000000000000002900000083040000ab0e217e287211d2c573adb65a294e0c821dec11c15003d1c44c2a6566a240f11f6237894b949a001800000000000000880000000300000092839a2370000000d0000000000000003a00000008000000d7b21a2c1f5971b85c53468d5cbe0f45719bef23bc3d9e59a83bf13ef393663efa8f3ee88e3658e47c0a39df4b18ce8f0f1cbd3c72ea96871317f5b40b32d1f9d909861fcde8ad2d76dcac6ec1cac2258f77dc5422b3ccc7d2bb1cce2ee83566b12aaf21a2ddb755181af4e2ce377bd472a32967aa3d5199d7aaee8e2eb8cf75d92137fb7ba5ffd51dd03c2a8760ba9e6cc785c8df8857e6f0daf5f0a85d319d9e02e44d8cf92ac68f11d306000d889a6508c333db6f9fc2bb341f9514ef8e00f800000000000000ffff00007f0000008e79f5579896c48dd867c87f877c1ee29238fcac61cdb7cb425498b037e66aa965e4a6911e56103cf2854c11f7a042fa7f4fbe11ba1dee94c2d86591a7415cd717d79d04090ff4595c313ca8531f0ba50ec3caf0b7591f7243e5748f35e11561ed4b471739aed24f8fdf9c549006347ea142b70d83a12b30a0b4b949bb381377945f04c760ded6c35934f11e81a82244d55e33fae55bcbe838e0c61c331069db01d5aa97bc0ccbca96b3bcb64ffdb25746d20bb0d0903471d4fa3610cfeb64cd13be59c184fa33089da5384c7293dbc16317d740a5057811c84233c78644e1f3193947b800000000200000000000000084000000060000005ed7cc46661ec1af3287be338c00000010"], 0x3b8}, 0x0) [ 407.523988][T18235] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 407.560696][T18235] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), 0xc) 16:41:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000134c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, @in, 0x6}, 0xa0) 16:41:40 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:40 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:40 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x0, 0x2}, 0x1c, 0x0, 0x0, 0x0, 0xfffffedc}, 0x104) 16:41:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@prinfo={0x14}], 0x14}, 0x0) [ 407.931819][T18260] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f00000000c0), &(0x7f0000000000)=0x8) [ 407.995616][T18260] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001360034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:40 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000001a40)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000001680)=[{0x10}, {0x10}], 0x20}, 0x0) 16:41:40 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:40 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000000)={@local={0xfe, 0x80, [], 0x0}}, 0x14) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) [ 408.215888][T18275] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 408.255414][T18275] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:40 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 16:41:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001368034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:40 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="bd", 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000080), 0x8) [ 408.546730][T11158] net_ratelimit: 32 callbacks suppressed [ 408.546750][T11158] bond2: (slave bridge3): failed to get link speed/duplex 16:41:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000001540), &(0x7f0000001600)=0x98) 16:41:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x5a, 0x0, &(0x7f0000000200)) [ 408.592863][T18299] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 408.639013][T18299] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 408.696950][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000136c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x8000}, 0x14) 16:41:41 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect(r0, &(0x7f0000000280)=@in6={0x1c, 0x1c, 0x1}, 0x1c) sendmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 408.806922][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) read(r0, &(0x7f0000000240)=""/82, 0xffffff71) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000080)={0x0, 0x10000}, 0x10) readv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/14, 0xe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) recvfrom$inet(r2, 0x0, 0x350, 0x0, 0x0, 0x800e004c7) poll(0x0, 0x0, 0xddff) shutdown(r2, 0x0) [ 408.926906][ T171] bond2: (slave bridge3): failed to get link speed/duplex [ 409.049194][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:41 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:41 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 16:41:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001374034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 409.178374][ T8] bond2: (slave bridge3): failed to get link speed/duplex 16:41:41 executing program 1: r0 = socket$inet6(0x1c, 0x3, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000040)=0x4b) [ 409.286917][ T305] bond2: (slave bridge3): failed to get link speed/duplex [ 409.340428][ T35] kauditd_printk_skb: 58 callbacks suppressed [ 409.340446][ T35] audit: type=1804 audit(1612024901.599:2446): pid=18337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/256/memory.events" dev="sda1" ino=16053 res=1 errno=0 16:41:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="39000000137a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0x0, 0x5620}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000100)="ae", 0x1}], 0x1, &(0x7f0000000580)=[@dstaddrv6={0x1c, 0x84, 0xa, @ipv4={[], [], @loopback}}, @sndrcv={0x2c}], 0x48}, 0x0) [ 409.398343][ T305] bond2: (slave bridge3): failed to get link speed/duplex 16:41:41 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:41 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 409.533955][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 409.575480][ T35] audit: type=1800 audit(1612024901.609:2447): pid=18337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16053 res=0 errno=0 [ 409.676835][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000003500)=ANY=[], 0x94) 16:41:42 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 409.721500][ T35] audit: type=1804 audit(1612024901.609:2448): pid=18337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/256/memory.events" dev="sda1" ino=16053 res=1 errno=0 [ 409.879668][ T35] audit: type=1804 audit(1612024901.659:2449): pid=18337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/256/memory.events" dev="sda1" ino=16053 res=1 errno=0 16:41:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000015c0), &(0x7f0000001600)=0x8) [ 410.018501][ T35] audit: type=1804 audit(1612024901.679:2450): pid=18343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/252/memory.events" dev="sda1" ino=15765 res=1 errno=0 [ 410.102085][ T35] audit: type=1800 audit(1612024901.679:2451): pid=18343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=15765 res=0 errno=0 [ 410.142064][ T35] audit: type=1804 audit(1612024901.689:2452): pid=18343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/252/memory.events" dev="sda1" ino=15765 res=1 errno=0 16:41:42 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013fc034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@alu={0x7, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:41:42 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 16:41:42 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000a00)="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", 0xb1d}], 0x1}, 0x0) [ 410.209505][ T35] audit: type=1804 audit(1612024901.799:2453): pid=18347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/252/memory.events" dev="sda1" ino=15765 res=1 errno=0 [ 410.294492][ T35] audit: type=1804 audit(1612024901.919:2454): pid=18354 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/257/memory.events" dev="sda1" ino=15970 res=1 errno=0 16:41:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013fd034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:42 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000001440)={0x1c, 0x1c, 0x1}, 0x1c) 16:41:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000000c0), 0xc) [ 410.417057][ T35] audit: type=1800 audit(1612024901.919:2455): pid=18354 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=15970 res=0 errno=0 16:41:42 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:42 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@init={0x14}], 0x14}, 0x0) 16:41:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:43 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:43 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000000)={0xfffffffc, {{0x1c, 0x1c, 0x2}}, {{0x1c, 0x1c, 0x2}}}, 0x108) 16:41:43 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:43 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, 0x0, 0x0) 16:41:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, 0x0, 0x0) 16:41:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x14) 16:41:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000080), 0x8) 16:41:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000001a40)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000280)="8e", 0x1}], 0x1, &(0x7f0000001680)=[{0x10}, {0x10}], 0x20}, 0x0) 16:41:43 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:43 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="49c85b5155", 0x5}], 0x1}, 0x0) 16:41:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 16:41:44 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:44 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:41:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 16:41:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000040), 0x8) 16:41:44 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@sndrcv={0x2c}], 0x2c}, 0x0) [ 412.106729][T18462] validate_nla: 15 callbacks suppressed [ 412.106749][T18462] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 412.167563][T18462] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0x0, 0x5620}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@dstaddrv6={0x1c, 0x84, 0xa, @ipv4={[], [], @loopback}}, @sndrcv={0x2c}], 0x48}, 0x0) 16:41:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0xfff, 0x8000, 0x7, 0x7}, 0x8) 16:41:44 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:44 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0xfff}, 0x8) [ 412.515769][T18479] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:45 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c9") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040), 0x8) 16:41:45 executing program 4: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4a, 0x0, 0x0) 16:41:45 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 16:41:45 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:45 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@abs={0x8}, 0x8, &(0x7f0000001600)=[{&(0x7f00000000c0)="3ad46321466ad8fca14ca296826eec8b76fff0fedec3dfbde33624775ec83c298b728dd7b6aa44205127edd18005429b2a7c147e8e6ed6e70cf97878b4a3301e43f24c8a45ecac72a20bec211c02786b6ce0d31a9272ed3f838f0be706372101b90bbdc6f7b8dd36ac58c7f9ff558d4ec5d5ccce048212ef5492df10ed32f20ce1f80cabd377eb51fa6750327955", 0x8e}, {&(0x7f0000000180)="13fe77", 0x3}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f00000011c0)="a5fd5aaa35ad48b214d63008a03bb12584767dc6995773fc34ea535cb69e7c8119bf709d31760a637ec1ef287f46e56f99a8f2ce100e9c8ecf50d05dae111fd36c38305847f9e8caa369daf9300f8b472ef5028c27e1f7d54d219d833b5e3014001f3e6db65376b4aef242deedff4d2d39f30d8c080705a542cf4585806f023362c781202de72218008cc5cafc1dbc70c331370fae1defae81108db8ae807e2c0efbdf3a176a441c7b829d36", 0xac}, {&(0x7f0000001280)="2fd9bcc8ea95bda9e73537cfe8e6940c88f41ba2a83e5b0e40a2be76a39203c2c3129b6df3eba7fd27b58e94c67c500ecf1383495a55", 0x36}, {&(0x7f00000012c0)="377d2f5d70b0930de6fe5501be2756372dce27ab811ce18ddd7066b4c6b9124b54e351a3aa8861c3c70340a49f0f7cea6ce017b2cc8a00a08144cff60d3054d6ef30590a9416954701ba64a744f9857fe7ed23aa84f2f34f87b31bbfb9b4291006f7626240c4045005c01d343229", 0x6e}], 0x1000000000000212, &(0x7f0000000380)=[@cred, @cred, @rights, @rights], 0x78}, 0x0) 16:41:45 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040), 0x10) 16:41:45 executing program 4: socket(0x20, 0x0, 0x8) 16:41:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x0, 0x7fffffff}, 0x10) [ 413.253342][T18483] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 413.292936][T18479] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:45 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c9") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000014c0)=[{&(0x7f0000000040)=""/125, 0x7d}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000140)=""/245, 0xf5}, {&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000340)=""/96, 0x60}, {&(0x7f00000003c0)=""/232, 0xe8}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x1031, 0x0, 0x0) 16:41:46 executing program 4: r0 = socket$inet6(0x18, 0x1, 0x0) listen(r0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0x18, 0x3}, 0xc) 16:41:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0xa) 16:41:46 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c9") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 413.827967][ T171] net_ratelimit: 19 callbacks suppressed [ 413.827990][ T171] bond2: (slave bridge3): failed to get link speed/duplex 16:41:46 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 16:41:46 executing program 2: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) [ 413.981334][T18528] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) listen(r0, 0x0) [ 414.043509][T18528] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 414.079416][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3900000013000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 414.197360][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:46 executing program 2: r0 = socket(0x18, 0x3, 0x0) sendmsg(r0, &(0x7f0000003680)={&(0x7f0000000040)=@in={0x2, 0x2}, 0xc, &(0x7f0000003480)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)='m', 0x1}], 0x2}, 0x0) 16:41:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e5") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:46 executing program 1: r0 = socket(0x18, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, &(0x7f0000000040), 0xfe0a) [ 414.306504][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) [ 414.376032][T18542] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 414.449050][ T51] bond2: (slave bridge3): failed to get link speed/duplex [ 414.480714][T18542] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 16:41:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00'}) [ 414.565354][ T35] kauditd_printk_skb: 62 callbacks suppressed [ 414.565381][ T35] audit: type=1804 audit(1612024906.829:2518): pid=18549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/259/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 414.566620][ T51] bond2: (slave bridge3): failed to get link speed/duplex 16:41:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005280)=ANY=[], 0x44}}, 0x0) [ 414.627076][ T35] audit: type=1800 audit(1612024906.829:2519): pid=18549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 [ 414.702153][T18542] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 414.723059][ T35] audit: type=1804 audit(1612024906.929:2520): pid=18553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/259/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:41:47 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00R7#'], 0x30}, 0x300}, 0x0) 16:41:47 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:41:47 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e5") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 414.861611][ T35] audit: type=1804 audit(1612024907.029:2521): pid=18553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/259/memory.events" dev="sda1" ino=16384 res=1 errno=0 16:41:47 executing program 1: socket(0x10, 0x3, 0xff) [ 415.259586][ T35] audit: type=1804 audit(1612024907.529:2522): pid=18572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/267/memory.events" dev="sda1" ino=16383 res=1 errno=0 [ 415.319218][ T35] audit: type=1804 audit(1612024907.559:2523): pid=18571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/260/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 415.353265][ T35] audit: type=1800 audit(1612024907.559:2524): pid=18571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 errno=0 [ 415.439723][ T35] audit: type=1804 audit(1612024907.579:2525): pid=18571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir408825715/syzkaller.jXFXbu/260/memory.events" dev="sda1" ino=16384 res=1 errno=0 [ 415.546412][ T305] bond2: (slave bridge3): failed to get link speed/duplex [ 415.574132][ T35] audit: type=1800 audit(1612024907.579:2526): pid=18572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16383 res=0 errno=0 16:41:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) 16:41:47 executing program 4: r0 = socket(0x2, 0x3, 0x4) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 16:41:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) 16:41:47 executing program 2: r0 = socket(0x2, 0x3, 0x4) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 415.630329][ T35] audit: type=1804 audit(1612024907.579:2527): pid=18573 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir175496138/syzkaller.mgUYA0/267/memory.events" dev="sda1" ino=16383 res=1 errno=0 [ 415.666400][ T305] bond2: (slave bridge3): failed to get link speed/duplex 16:41:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000003200)) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000180)=""/240, 0xf0}], 0x2, &(0x7f0000000080)=""/18, 0x12}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00R7#'], 0x30}}, 0x0) [ 415.776527][ T305] bond2: (slave bridge3): failed to get link speed/duplex 16:41:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x2) 16:41:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0900000000000200ff000700000008000300", @ANYRES32=r3, @ANYBLOB="0800051d000000001400060076657468315f746f5f7465616d0000000400cc0008000500040000001400040073"], 0x58}}, 0x0) close(r2) [ 415.888155][ T305] bond2: (slave bridge3): failed to get link speed/duplex 16:41:48 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) 16:41:48 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e5") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 416.414683][T18600] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 16:41:48 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6d, 0x4}]}, {0x0, [0x5f, 0x30, 0x0, 0x0]}}, &(0x7f0000000580)=""/4096, 0x46, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579eda3d619359c338f6844f7fd6b7726a59d31dbd295c142b7c30585b27390ac2ed0") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 416.638192][T11327] ------------[ cut here ]------------ [ 416.644029][T11327] WARNING: CPU: 0 PID: 11327 at net/wireless/core.c:1113 _cfg80211_unregister_wdev+0x453/0x740 [ 416.672713][T18610] netlink: 'syz-executor.4': attribute type 11 has an invalid length. 16:41:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300144700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) [ 416.718755][T11327] Modules linked in: [ 416.738541][T11327] CPU: 0 PID: 11327 Comm: kworker/0:8 Not tainted 5.11.0-rc5-syzkaller #0 [ 416.772452][T11327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.800948][T11327] Workqueue: events cfg80211_destroy_iface_wk [ 416.815420][T11327] RIP: 0010:_cfg80211_unregister_wdev+0x453/0x740 [ 416.850927][T11327] Code: 3e f9 48 8d 7d 68 be ff ff ff ff e8 77 b9 c6 00 31 ff 41 89 c6 89 c6 e8 2b 2b 3e f9 45 85 f6 0f 85 65 fc ff ff e8 9d 23 3e f9 <0f> 0b e9 59 fc ff ff e8 91 23 3e f9 4c 89 f2 48 b8 00 00 00 00 00 16:41:49 executing program 1: socket(0x1d, 0x0, 0x81) [ 416.950871][T11327] RSP: 0018:ffffc90002797c40 EFLAGS: 00010293 [ 416.960711][T11327] RAX: 0000000000000000 RBX: ffff88802d318bd0 RCX: 0000000000000000 [ 416.973175][T11327] RDX: ffff88801a920000 RSI: ffffffff88349a23 RDI: 0000000000000003 [ 416.984625][T11327] RBP: ffff88805f998580 R08: 0000000000000000 R09: ffffffff8ca5a427 [ 416.997757][T11327] R10: ffffffff88349a15 R11: 0000000000000001 R12: 0000000000000001 [ 417.020120][T11327] R13: ffff88805f998000 R14: 0000000000000000 R15: ffff88805f998580 [ 417.041435][T11327] FS: 0000000000000000(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 [ 417.061248][T11327] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 417.082468][T11327] CR2: 0000001b3032d000 CR3: 000000005aec7000 CR4: 00000000001506f0 [ 417.113878][T11327] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 417.136292][T11327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 417.145042][T11327] Call Trace: [ 417.155465][T11327] ieee80211_if_remove+0x1df/0x300 [ 417.164019][T11327] ieee80211_del_iface+0x12/0x20 [ 417.172509][T11327] cfg80211_destroy_ifaces+0x1d9/0x6e0 [ 417.181459][T11327] cfg80211_destroy_iface_wk+0x1a/0x20 [ 417.190382][T11327] process_one_work+0x98d/0x15f0 [ 417.195721][T11327] ? pwq_dec_nr_in_flight+0x320/0x320 [ 417.213168][T11327] ? rwlock_bug.part.0+0x90/0x90 [ 417.221513][T11327] ? _raw_spin_lock_irq+0x41/0x50 [ 417.230123][T11327] worker_thread+0x64c/0x1120 [ 417.235048][T11327] ? process_one_work+0x15f0/0x15f0 [ 417.246944][T11327] kthread+0x3b1/0x4a0 [ 417.251248][T11327] ? __kthread_bind_mask+0xc0/0xc0 16:41:49 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f0000000580)=""/4096, 0x0, 0x1000, 0x1}, 0x20) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x305b3000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xff4d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340), 0x0) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl(0xffffffffffffffff, 0xff, &(0x7f0000000180)="7589fff643dd83669511a02452fefcc0a34054e73558a3c917db63e579ed") ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$EXT4_IOC_MIGRATE(r3, 0x6628) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0xe74) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x1000000) [ 417.262509][T11327] ret_from_fork+0x1f/0x30 [ 417.281215][T11327] Kernel panic - not syncing: panic_on_warn set ... [ 417.287829][T11327] CPU: 0 PID: 11327 Comm: kworker/0:8 Not tainted 5.11.0-rc5-syzkaller #0 [ 417.296342][T11327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.306408][T11327] Workqueue: events cfg80211_destroy_iface_wk [ 417.312530][T11327] Call Trace: [ 417.315844][T11327] dump_stack+0x107/0x163 [ 417.320193][T11327] panic+0x306/0x73d [ 417.324143][T11327] ? __warn_printk+0xf3/0xf3 [ 417.328764][T11327] ? __warn.cold+0x1a/0x44 [ 417.333200][T11327] ? _cfg80211_unregister_wdev+0x453/0x740 [ 417.339029][T11327] __warn.cold+0x35/0x44 [ 417.343289][T11327] ? _cfg80211_unregister_wdev+0x453/0x740 [ 417.349116][T11327] report_bug+0x1bd/0x210 [ 417.353529][T11327] handle_bug+0x3c/0x60 [ 417.357701][T11327] exc_invalid_op+0x14/0x40 [ 417.362219][T11327] asm_exc_invalid_op+0x12/0x20 [ 417.367091][T11327] RIP: 0010:_cfg80211_unregister_wdev+0x453/0x740 [ 417.373525][T11327] Code: 3e f9 48 8d 7d 68 be ff ff ff ff e8 77 b9 c6 00 31 ff 41 89 c6 89 c6 e8 2b 2b 3e f9 45 85 f6 0f 85 65 fc ff ff e8 9d 23 3e f9 <0f> 0b e9 59 fc ff ff e8 91 23 3e f9 4c 89 f2 48 b8 00 00 00 00 00 [ 417.393146][T11327] RSP: 0018:ffffc90002797c40 EFLAGS: 00010293 [ 417.399230][T11327] RAX: 0000000000000000 RBX: ffff88802d318bd0 RCX: 0000000000000000 [ 417.407212][T11327] RDX: ffff88801a920000 RSI: ffffffff88349a23 RDI: 0000000000000003 [ 417.415194][T11327] RBP: ffff88805f998580 R08: 0000000000000000 R09: ffffffff8ca5a427 [ 417.423176][T11327] R10: ffffffff88349a15 R11: 0000000000000001 R12: 0000000000000001 [ 417.431421][T11327] R13: ffff88805f998000 R14: 0000000000000000 R15: ffff88805f998580 [ 417.439415][T11327] ? _cfg80211_unregister_wdev+0x445/0x740 [ 417.445252][T11327] ? _cfg80211_unregister_wdev+0x453/0x740 [ 417.451095][T11327] ieee80211_if_remove+0x1df/0x300 [ 417.456231][T11327] ieee80211_del_iface+0x12/0x20 [ 417.461192][T11327] cfg80211_destroy_ifaces+0x1d9/0x6e0 [ 417.466679][T11327] cfg80211_destroy_iface_wk+0x1a/0x20 [ 417.472155][T11327] process_one_work+0x98d/0x15f0 [ 417.477126][T11327] ? pwq_dec_nr_in_flight+0x320/0x320 [ 417.482522][T11327] ? rwlock_bug.part.0+0x90/0x90 [ 417.487475][T11327] ? _raw_spin_lock_irq+0x41/0x50 [ 417.492534][T11327] worker_thread+0x64c/0x1120 [ 417.497256][T11327] ? process_one_work+0x15f0/0x15f0 [ 417.502470][T11327] kthread+0x3b1/0x4a0 [ 417.506553][T11327] ? __kthread_bind_mask+0xc0/0xc0 [ 417.511681][T11327] ret_from_fork+0x1f/0x30 [ 417.516996][T11327] Kernel Offset: disabled [ 417.521502][T11327] Rebooting in 86400 seconds..