904023/syzkaller.Cnaqj7/884/memory.events" dev="sda1" ino=15874 res=1 [ 1330.116944][T20661] device bond0 left promiscuous mode [ 1330.122493][T20661] device bond_slave_0 left promiscuous mode 20:55:38 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x31000000}}}}}}}}}, 0x0) 20:55:38 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) listen(r0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, 0x0, 0x0) [ 1330.142679][T20661] device bond_slave_1 left promiscuous mode [ 1330.151418][T20661] bridge210: port 1(bond0) entered disabled state [ 1330.172322][ T27] audit: type=1800 audit(1589144138.140:1725): pid=20681 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15874 res=0 20:55:38 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3d000000}}}}}}}}}, 0x0) [ 1330.220941][ T27] audit: type=1804 audit(1589144138.140:1726): pid=20681 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/884/memory.events" dev="sda1" ino=15874 res=1 20:55:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x344}, 0x48) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48044}, 0x40080) 20:55:38 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3f000000}}}}}}}}}, 0x0) [ 1330.680649][ T27] audit: type=1800 audit(1589144138.710:1727): pid=20709 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=15874 res=0 [ 1330.755357][ T27] audit: type=1804 audit(1589144138.740:1728): pid=20708 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/884/memory.events" dev="sda1" ino=15874 res=1 [ 1330.946169][T20698] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1330.962829][T20707] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1331.012302][T20667] bridge210: port 1(bond0) entered blocking state [ 1331.026146][T20667] bridge210: port 1(bond0) entered disabled state [ 1331.039301][T20667] device bond0 entered promiscuous mode [ 1331.045160][T20667] device bond_slave_0 entered promiscuous mode [ 1331.054463][T20667] device bond_slave_1 entered promiscuous mode 20:55:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000b300000100000014000180080005000007e7f661bd8a1a000000060001000aee0000"], 0x28}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 20:55:39 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x40000000}}}}}}}}}, 0x0) [ 1331.070381][T20710] device bond0 left promiscuous mode [ 1331.077807][T20710] device bond_slave_0 left promiscuous mode [ 1331.087337][T20710] device bond_slave_1 left promiscuous mode [ 1331.095270][T20710] bridge210: port 1(bond0) entered disabled state 20:55:39 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x60000000}}}}}}}}}, 0x0) [ 1331.292362][ T27] audit: type=1804 audit(1589144139.320:1729): pid=20721 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/885/cgroup.controllers" dev="sda1" ino=15992 res=1 20:55:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0xe, 0x8100, r6}}, 0x20}}, 0x0) 20:55:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:39 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000180)={'gre0\x00', {0x2, 0x4e21, @empty}}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000040)=0x3ff) connect(r1, &(0x7f0000000740)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x80) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$can_bcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1, 0x18, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "d6b2f5450b29fda9"}}, 0x48}}, 0x0) r5 = socket$inet(0x2, 0xd, 0x8000) sendto$l2tp(r5, &(0x7f0000000200)="37535a77e68c53048e6aa6c4497692e7e46904de76bd571d734bf04dff5ab4feda475190ec13234ad2684cc6bd4d18cce5d0ee5973ba7e1d058cfa3e3d86f1cc", 0x40, 0x10, &(0x7f0000000240)={0x2, 0x0, @remote, 0x2}, 0x10) [ 1331.466471][T20734] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1331.534341][T20736] bridge210: port 1(bond0) entered blocking state [ 1331.546849][T20736] bridge210: port 1(bond0) entered disabled state [ 1331.566754][T20736] device bond0 entered promiscuous mode [ 1331.575015][T20736] device bond_slave_0 entered promiscuous mode [ 1331.582876][T20736] device bond_slave_1 entered promiscuous mode [ 1331.595465][T20734] device bond0 left promiscuous mode [ 1331.601833][T20734] device bond_slave_0 left promiscuous mode [ 1331.619850][T20734] device bond_slave_1 left promiscuous mode [ 1331.636537][T20734] bridge210: port 1(bond0) entered disabled state 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x6d000000}}}}}}}}}, 0x0) 20:55:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp(0x2, 0x2, 0x73) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_ORIG_INTERVAL={0x3, 0x39, 0x8}]}, 0x1c}}, 0x240080c5) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={r7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)={r7, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e23, 0x8001, @mcast2, 0x4}}}, 0x84) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x8dffffff}}}}}}}}}, 0x0) [ 1332.127642][ T27] audit: type=1804 audit(1589144140.150:1730): pid=20759 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/886/cgroup.controllers" dev="sda1" ino=15997 res=1 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xe8030000}}}}}}}}}, 0x0) 20:55:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xf5ffffff}}}}}}}}}, 0x0) [ 1332.295821][T20767] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1332.363462][T20734] bridge210: port 1(bond0) entered blocking state [ 1332.372941][T20734] bridge210: port 1(bond0) entered disabled state 20:55:40 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e31032cfff6"], 0xd) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'bond0\x00', {}, 0x7}) pipe(&(0x7f0000008f40)) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r5, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x3}, @FOU_ATTR_PEER_PORT={0xfffffffffffffc20, 0xa, 0x4e23}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x84}, @FOU_ATTR_PEER_V4={0x8, 0x8, @private=0xa010100}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x4c, r6, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(r7, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0x1000}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 1332.393462][ T27] audit: type=1804 audit(1589144140.420:1731): pid=20771 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1183/cgroup.controllers" dev="sda1" ino=16010 res=1 [ 1332.441899][T20734] device bond0 entered promiscuous mode [ 1332.461043][T20734] device bond_slave_0 entered promiscuous mode [ 1332.484262][T20734] device bond_slave_1 entered promiscuous mode [ 1332.499718][ T27] audit: type=1804 audit(1589144140.510:1732): pid=20778 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1364/memory.events" dev="sda1" ino=16013 res=1 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffff8d}}}}}}}}}, 0x0) [ 1332.545646][T20736] device bond0 left promiscuous mode [ 1332.552722][T20736] device bond_slave_0 left promiscuous mode [ 1332.579815][T20736] device bond_slave_1 left promiscuous mode [ 1332.600366][T20736] bridge210: port 1(bond0) entered disabled state [ 1332.620368][ T27] audit: type=1800 audit(1589144140.510:1733): pid=20778 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16013 res=0 20:55:40 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xfffffff5}}}}}}}}}, 0x0) 20:55:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x10, 0x8100, r6}}, 0x20}}, 0x0) 20:55:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:41 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000240)={'macsec0\x00', {0x2, 0x4e23, @multicast1}}) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNADDRESOURCE(r1, 0x89e0, &(0x7f0000000380)=0xfffffff8) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468000000001800"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="4000000014009ff300000000000000000a000200", @ANYRES32=r6, @ANYBLOB="14000100fe8000004e324901000000000000000014000200fe88000000000000000000000000000131202248d4d30ef026a1df6a50fe2635a7ca8675bdcab37177251cc8a90420f9b513a34959156f1adfb25cb50237057d88cca8ecf3a9658976e5f16b5a342f3863ed55efb1377dbe15cd17ce7ea15b40813590b60942490152aca679a94f7f561a2378cd373a52891cd0219917ed076a6318f87900ab12f53dfca10bed48d36be2ced4010065a5f2686ece82c1b55cadfc5c6f34953e17af72509532f73c45d4"], 0x40}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0xffff, r6}}, 0x20}}, 0x0) 20:55:41 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{}, 0x1, {0xffffffff}}}}}}}}}, 0x0) 20:55:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) listen(r0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0xa, "944071d8b58d03dfbc5f44d1dde05f815aa7f876e288a02f5a979f41a7ba7a20b8e98d90b881bfce1f9c0e3e7d283d8ddbfb6c9ff6848a6f3d2d160c7ae435a2698ed829df6ad532704b662d6dddb8600dd0d8099811fd9faae5c0b65133fce58beb7a064048f14c2f852c17d7184f724a6226f9965050945356f49182697293f22845cacccb7b65741f0d88a4f49788ef998532cc64e6549d2fb27e5a04215eea8c567b777977ddcd7b256d154acb9123f2cb76c0afadb380002dec2b7bd89bbca57b42d7be440f08095d2f21ea307864c74ca951dab43579d06917"}, 0xf8) syz_emit_ethernet(0xa9, &(0x7f0000000280)={@local, @random="c141c68f726e", @val={@void, {0x8100, 0x4, 0x1, 0x4}}, {@llc={0x4, {@snap={0x0, 0x1, "c2fd", '\x00', 0x8847, "5c8cb70f4dd5fc702e519921391c702dd21d5380fdac007f9064af7476466c8f417ef592c9203d31593e142430296678b9f5e6ab03eea1810e50ba7da1d20d9964e990b82a7020a9df1344d1e6cdf20be54b3946346e133fe378e1e7eb0a5acdef2cc77a97dba71b53d5ccd0b238a04d3db70b9ee779d9f40f04d254a8f13d0f38d5336772bcb59fccb5691b1d56"}}}}}, 0x0) [ 1333.182223][T20807] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1333.210295][T20807] bridge210: port 1(bond0) entered blocking state [ 1333.224045][T20807] bridge210: port 1(bond0) entered disabled state [ 1333.248174][T20807] device bond0 entered promiscuous mode [ 1333.274333][T20807] device bond_slave_0 entered promiscuous mode 20:55:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r4, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={r4, 0x5, 0x80, 0x3, 0x7, 0x72cab7a0}, 0x14) r5 = socket$inet_smc(0x2b, 0x1, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r6, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r7}, 0x30) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) [ 1333.303893][T20807] device bond_slave_1 entered promiscuous mode [ 1333.341994][T20816] device bond0 left promiscuous mode [ 1333.347475][T20816] device bond_slave_0 left promiscuous mode 20:55:41 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x2}}}}}}}, 0x0) [ 1333.380342][T20816] device bond_slave_1 left promiscuous mode [ 1333.411393][T20816] bridge210: port 1(bond0) entered disabled state 20:55:41 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x3}}}}}}}, 0x0) 20:55:41 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x4}}}}}}}, 0x0) 20:55:41 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x5}}}}}}}, 0x0) 20:55:41 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0xf, 0x2, 0x10077, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x25, 0x2, 0x1, &(0x7f0000000300)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='rdma.current\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000000), &(0x7f0000000100)=0x4) socket$nl_route(0x10, 0x3, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) accept$nfc_llcp(r4, &(0x7f0000000380), &(0x7f0000000280)=0x60) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x48, 0x140c, 0x0, 0x70bd25, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x94}, 0x20040000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00400200000000001c0012800b0001006d616373656300000c00028005000b00000000000a000500140000000000000008000a00", @ANYRES32=r6, @ANYBLOB="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"], 0x50}}, 0x0) [ 1334.315756][T20807] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1334.342110][T20816] bridge210: port 1(bond0) entered blocking state [ 1334.358945][T20816] bridge210: port 1(bond0) entered disabled state [ 1334.380588][T20816] device bond0 entered promiscuous mode [ 1334.388082][T20816] device bond_slave_0 entered promiscuous mode [ 1334.394601][T20816] device bond_slave_1 entered promiscuous mode [ 1334.411974][T20856] device bond0 left promiscuous mode [ 1334.417411][T20856] device bond_slave_0 left promiscuous mode [ 1334.440557][T20856] device bond_slave_1 left promiscuous mode [ 1334.461833][T20856] bridge210: port 1(bond0) entered disabled state [ 1334.620693][T20865] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 20:55:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x48, 0x8100, r6}}, 0x20}}, 0x0) 20:55:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x10, 0x8100, r6}}, 0x20}}, 0x0) 20:55:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x6}}}}}}}, 0x0) 20:55:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) [ 1334.833812][T20892] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1334.942941][T20895] bridge210: port 1(bond0) entered blocking state [ 1334.955587][T20895] bridge210: port 1(bond0) entered disabled state 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x7}}}}}}}, 0x0) [ 1335.029638][T20895] device bond0 entered promiscuous mode [ 1335.055169][T20895] device bond_slave_0 entered promiscuous mode [ 1335.097482][T20895] device bond_slave_1 entered promiscuous mode 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x9}}}}}}}, 0x0) [ 1335.141826][T20901] device bond0 left promiscuous mode [ 1335.147372][T20901] device bond_slave_0 left promiscuous mode [ 1335.189973][T20901] device bond_slave_1 left promiscuous mode [ 1335.216391][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 1335.216405][ T27] audit: type=1804 audit(1589144143.240:1741): pid=20899 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1185/cgroup.controllers" dev="sda1" ino=16017 res=1 [ 1335.222899][T20901] bridge210: port 1(bond0) entered disabled state 20:55:43 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff}, 0x14}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000a00000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004"], 0x1}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NLBL_MGMT_C_REMOVEDEF(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x45}}}}}}}, 0x0) 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1335.510306][T20904] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1335.540329][T20907] bridge8: port 1(bond0) entered blocking state [ 1335.556336][T20907] bridge8: port 1(bond0) entered disabled state [ 1335.569027][T20907] device bond0 entered promiscuous mode [ 1335.574879][T20907] device bond_slave_0 entered promiscuous mode [ 1335.582911][T20907] device bond_slave_1 entered promiscuous mode [ 1335.596760][T20911] device bond0 left promiscuous mode 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3}}}}}}}, 0x0) [ 1335.609637][T20911] device bond_slave_0 left promiscuous mode [ 1335.616338][T20911] device bond_slave_1 left promiscuous mode [ 1335.622972][T20911] bridge8: port 1(bond0) entered disabled state 20:55:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x5}}}}}}}, 0x0) [ 1335.762326][T20932] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1336.009549][T20892] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1336.026565][T20895] bridge210: port 1(bond0) entered blocking state [ 1336.033818][T20895] bridge210: port 1(bond0) entered disabled state [ 1336.042343][T20895] device bond0 entered promiscuous mode [ 1336.048480][T20895] device bond_slave_0 entered promiscuous mode [ 1336.055116][T20895] device bond_slave_1 entered promiscuous mode [ 1336.070134][T20935] device bond0 left promiscuous mode [ 1336.075747][T20935] device bond_slave_0 left promiscuous mode [ 1336.082210][T20935] device bond_slave_1 left promiscuous mode [ 1336.090828][T20935] bridge210: port 1(bond0) entered disabled state 20:55:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6}}}}}}}, 0x0) 20:55:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") unshare(0x20400) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000001300)={@local, @broadcast}, &(0x7f0000001340)=0xc) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r6, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000003c00)={0x0, 0x1, 0xe9e8}, &(0x7f0000003c40)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000003c80)={r7, 0x2}, &(0x7f0000003cc0)=0x8) write$tun(r3, &(0x7f0000000000)={@val={0x0, 0xadc}, @val={0x2, 0x0, 0x7c0, 0x4, 0x7, 0x8001}, @eth={@broadcast, @remote, @void, {@can={0xc, {{0x3, 0x1}, 0x8, 0x0, 0x0, 0x0, "846ee305dd37940b"}}}}}, 0x2c) 20:55:44 executing program 0: r0 = epoll_create1(0x80000) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x10002001}) syz_emit_ethernet(0x66, &(0x7f0000000280)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x30, 0x3a, 0x0, @local={0xfe, 0x80, [0x2, 0x10, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "a441f9", 0x0, 0x32, 0x0, @private0, @remote}}}}}}}, 0x0) 20:55:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x4c, 0x8100, r6}}, 0x20}}, 0x0) 20:55:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x7}}}}}}}, 0x0) [ 1336.664506][T20968] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:55:44 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) openat$cgroup_ro(r3, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @multicast1}, {0x1, @random="272603586e0e"}, 0x50, {0x2, 0x4e23, @rand_addr=0x64010102}, 'batadv_slave_0\x00'}) r6 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) preadv(r6, &(0x7f00000012c0)=[{&(0x7f00000000c0)=""/40, 0x10}], 0x1, 0x0) read(r6, 0x0, 0x0) bind$netlink(r6, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc) 20:55:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x8}}}}}}}, 0x0) [ 1336.752139][T20975] bridge210: port 1(bond0) entered blocking state [ 1336.763362][T20975] bridge210: port 1(bond0) entered disabled state [ 1336.791794][T20975] device bond0 entered promiscuous mode [ 1336.807984][T20975] device bond_slave_0 entered promiscuous mode [ 1336.835217][T20975] device bond_slave_1 entered promiscuous mode [ 1336.873629][T20984] device bond0 left promiscuous mode [ 1336.879465][T20984] device bond_slave_0 left promiscuous mode [ 1336.885589][ T27] audit: type=1804 audit(1589144144.921:1742): pid=20973 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1186/cgroup.controllers" dev="sda1" ino=16034 res=1 20:55:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x31}}}}}}}, 0x0) [ 1336.937313][T20984] device bond_slave_1 left promiscuous mode [ 1336.966983][T20984] bridge210: port 1(bond0) entered disabled state 20:55:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3d}}}}}}}, 0x0) 20:55:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x60}}}}}}}, 0x0) 20:55:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 1337.562662][ T27] audit: type=1804 audit(1589144145.591:1743): pid=21008 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1187/cgroup.controllers" dev="sda1" ino=16020 res=1 [ 1337.766845][T20975] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1337.843973][T20968] bridge210: port 1(bond0) entered blocking state [ 1337.857395][T20968] bridge210: port 1(bond0) entered disabled state [ 1337.890223][T20968] device bond0 entered promiscuous mode [ 1337.895806][T20968] device bond_slave_0 entered promiscuous mode [ 1337.934942][T20968] device bond_slave_1 entered promiscuous mode [ 1337.944869][T21012] device bond0 left promiscuous mode [ 1337.957702][T21012] device bond_slave_0 left promiscuous mode [ 1337.963834][T21012] device bond_slave_1 left promiscuous mode [ 1337.978311][T21012] bridge210: port 1(bond0) entered disabled state 20:55:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 20:55:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x60, 0x8100, r6}}, 0x20}}, 0x0) 20:55:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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"/820], 0x34c}}, 0x4004015) socket(0x0, 0x5, 0x4) 20:55:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6d}}}}}}}, 0x0) 20:55:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x78, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e000a0003000200c03737153e370a00118000000000d1bd", 0x2e}], 0x1}, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e23, 0xfffffff7, @ipv4={[], [], @rand_addr=0x64010102}, 0x8001}, {0xa, 0x4e22, 0x101, @empty, 0x7}, 0xc171, [0x80000001, 0x40, 0x8, 0x4, 0x8, 0xfffffffd, 0x5, 0x7fffffff]}, 0x5c) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) bind$rxrpc(r2, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2, 0x4}}, 0x24) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000ec00000000000000038973d8acd122df2e29c075f482d9df560279c893a69e9851ef0c47aea598d4f04764556b57256fc1ad51b6d2cabc8422ef225357dda555bb8573cfc66c527f4aabbddde5b34bdcc46f9bd23c38cf"], 0x18}}], 0x1, 0x0) recvfrom$rxrpc(r2, 0x0, 0xfffffffffffffe7c, 0x80012000, 0x0, 0x0) connect$pppoe(r2, &(0x7f0000001100)={0x18, 0x0, {0x4, @remote, 'bridge0\x00'}}, 0x1e) socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$inet_group_source_req(r2, 0x0, 0x2d, &(0x7f0000000180)={0x4, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @broadcast}}}, 0x108) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000000000000000000047d000000080abb7f4b5c4dc5a38962cdba1eb0466ad63120ea722250db4bf2530141c7d4f0704a5a14"], 0x0, 0x26}, 0x20) 20:55:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x300}}}}}}}, 0x0) [ 1338.470259][ T27] audit: type=1804 audit(1589144146.501:1744): pid=21042 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1188/cgroup.controllers" dev="sda1" ino=16044 res=1 [ 1338.502312][T21049] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:55:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$inet(0x2, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x20004044}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="3800b700240007050000004007a2a300d843165f", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x20, 0x140e, 0x100, 0x70bd27, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000051}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x6c, 0x2c, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x8}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x3c, 0x2, [@TCA_FLOW_EMATCHES={0x38, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}]}}]}]}]}}]}, 0x6c}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) 20:55:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3e8}}}}}}}, 0x0) [ 1338.579724][T21059] bridge210: port 1(bond0) entered blocking state [ 1338.606180][T21059] bridge210: port 1(bond0) entered disabled state 20:55:46 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000180)={{0x2f, @rand_addr=0x64010102, 0x4e24, 0x2, 'sh\x00', 0x23, 0x3, 0x48}, {@remote, 0x4e22, 0x4, 0x3, 0x3f, 0x5}}, 0x44) socket$unix(0x1, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x3) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) [ 1338.656064][T21059] device bond0 entered promiscuous mode [ 1338.680353][T21059] device bond_slave_0 entered promiscuous mode [ 1338.701744][T21059] device bond_slave_1 entered promiscuous mode 20:55:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x500}}}}}}}, 0x0) [ 1338.737085][T21070] device bond0 left promiscuous mode [ 1338.746026][T21070] device bond_slave_0 left promiscuous mode [ 1338.754120][T21082] IPVS: set_ctl: invalid protocol: 47 100.1.1.2:20004 [ 1338.762084][T21070] device bond_slave_1 left promiscuous mode [ 1338.773614][T21070] bridge210: port 1(bond0) entered disabled state 20:55:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x600}}}}}}}, 0x0) [ 1339.003923][T21098] IPVS: set_ctl: invalid protocol: 47 100.1.1.2:20004 20:55:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 1339.174100][ T27] audit: type=1804 audit(1589144147.201:1745): pid=21100 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1189/cgroup.controllers" dev="sda1" ino=15857 res=1 [ 1339.592603][T21049] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1339.621451][T21059] bridge210: port 1(bond0) entered blocking state [ 1339.637982][T21059] bridge210: port 1(bond0) entered disabled state [ 1339.655828][T21059] device bond0 entered promiscuous mode [ 1339.662588][T21059] device bond_slave_0 entered promiscuous mode [ 1339.670297][T21059] device bond_slave_1 entered promiscuous mode [ 1339.680186][T21103] device bond0 left promiscuous mode [ 1339.686747][T21103] device bond_slave_0 left promiscuous mode [ 1339.694533][T21103] device bond_slave_1 left promiscuous mode [ 1339.703065][T21103] bridge210: port 1(bond0) entered disabled state 20:55:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x700}}}}}}}, 0x0) 20:55:48 executing program 1: r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x2, 0x1}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)="693f9b3e9c00943e0b5474f7940e8e58ca6823a2ea2cae0736fceb417d20a085e16a39154b0f2f00d304303453", 0x2d}, {&(0x7f0000000140)="1368f4c8ad21842874f91d016c38524ded24fe3692fd61a9168f17956494a3fa6e25cbd505d4c0acdf8b0243", 0x2c}, {&(0x7f0000000180)="54669eb328b0aad0799c5cc0e99ff3edf33531", 0x13}], 0x3, &(0x7f0000000200)="5e1a437129d012111f136ae12f4347eb215c15549f23dee817f5b9a79e816f4d26cd7da85628e802177da6c77fe24e37fed06d3bb01b2a96252adfcb65ae0285e62b372c2141113e564b6694dbb647bffbc223b969720e8de3870b3bdab918368b336a738624606d34a5d124e76844febad05e115096a6e299875e4b3d6e0431ca63188637a9c783b1f0449f71f6bad78d744a9d793235a7065f600ea6864a9a53b88edcf0f133e428ebd331edef951f7ed259c2e5d7a72fc45e7051d40bb0a58c9dbed9ecbf6eadc4a133296362b35d20d627ede0ca1d8d62baac4358c18051fd8b74a310de65652478684a2010c624b195c9636108aba9e8b1", 0xfa, 0x20000080}, 0x21d4c2b14443fb94) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000023000511d25a80648c63940d0524fc60100006400a0003000200000037153e370a00018002000000d1bd", 0x33fe0}], 0x1}, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000180)={r6, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r6, 0x4) 20:55:48 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x68, 0x0, 0x8b8e0eb13081c495, 0x0, 0x0, {{0x1, 0x0, 0x5901}, {0x0, 0x4109}, {0x4c, 0x18, {0x411, @media='ib\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x2c, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x10, 0x18, {0x1, @bearer=@l2={'ib', 0x3a, 'sit0\x00'}}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040}, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x20, 0x7, [0x7, 0x3f, 0x6, 0x20, 0x200, 0xffff, 0x0]}, &(0x7f0000000040)=0x16) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @hyper}, 0x10) unshare(0x40000000) r5 = socket(0x9, 0x1, 0x0) sendmmsg$alg(r5, 0x0, 0x0, 0x0) r6 = accept4$ax25(r5, &(0x7f0000000080)={{}, [@bcast, @remote, @null, @bcast, @bcast, @remote, @remote, @netrom]}, &(0x7f0000000100)=0x48, 0x80000) mmap(&(0x7f00001d2000/0x2000)=nil, 0x2000, 0x3, 0x4000010, r6, 0x74f05000) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 20:55:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x68, 0x8100, r6}}, 0x20}}, 0x0) [ 1340.084288][T21129] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1340.104603][T21130] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1340.120966][T21135] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 20:55:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3100}}}}}}}, 0x0) [ 1340.186105][ T27] audit: type=1804 audit(1589144148.211:1746): pid=21133 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1190/cgroup.controllers" dev="sda1" ino=16242 res=1 [ 1340.215796][T21136] IPVS: ftp: loaded support on port[0] = 21 [ 1340.222365][T21137] bridge210: port 1(bond0) entered blocking state 20:55:48 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x1c0, 0x0, 0xf8, 0xffffffff, 0xffffffff, 0x2c0, 0x2c0, 0x2c0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0xffffffffffffffff, [0x0, 0x1, 0x4, 0x0, 0x1, 0x7]}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [], @private=0xa010100}, 'veth1_to_bond\x00', {0x84d}}}}, {{@uncond, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1, 0x6, 0x2}, {0x0, 0x2, 0x1}, {0xffffffffffffffff, 0x2, 0x1}, 0x200, 0x20}}}, {{@ip={@remote, @local, 0xff000000, 0xffffffff, 'nr0\x00', 'ip_vti0\x00', {}, {0xff}, 0xeb, 0x2, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@ipcomp={{0x30, 'ipcomp\x00'}, {[0x4d2, 0x4d2], 0x2}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x4, 0xe, [0x3a, 0xc, 0x33, 0x32, 0x32, 0x39, 0x32, 0xb, 0x38, 0xf, 0x16, 0x17, 0x3f, 0x11, 0x1f, 0x11], 0x0, 0x9, 0x8000000000}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r4, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={r4, 0x100}, 0x8) [ 1340.241094][T21137] bridge210: port 1(bond0) entered disabled state [ 1340.283056][T21137] device bond0 entered promiscuous mode [ 1340.313400][T21137] device bond_slave_0 entered promiscuous mode [ 1340.346569][T21137] device bond_slave_1 entered promiscuous mode [ 1340.376520][T21152] x_tables: duplicate underflow at hook 2 [ 1340.391047][T21142] device bond0 left promiscuous mode 20:55:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3d00}}}}}}}, 0x0) [ 1340.396576][T21142] device bond_slave_0 left promiscuous mode [ 1340.425999][T21142] device bond_slave_1 left promiscuous mode [ 1340.431965][T21153] x_tables: duplicate underflow at hook 2 20:55:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) pipe(&(0x7f0000000340)) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=0x60) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a30509d67d1bf2286b6e0071318fdb7c9606232dde013392472ff65"], 0x6) socket$l2tp(0x2, 0x2, 0x73) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000380", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 1340.476384][T21142] bridge210: port 1(bond0) entered disabled state 20:55:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3f00}}}}}}}, 0x0) 20:55:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) [ 1340.690247][ T27] audit: type=1804 audit(1589144148.721:1747): pid=21159 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/895/cgroup.controllers" dev="sda1" ino=16077 res=1 [ 1340.915728][ T27] audit: type=1804 audit(1589144148.941:1748): pid=21169 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1191/cgroup.controllers" dev="sda1" ino=16178 res=1 [ 1341.000806][T21173] IPVS: ftp: loaded support on port[0] = 21 [ 1341.301744][T21136] netdevsim0 speed is unknown, defaulting to 1000 [ 1341.308935][T21137] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:55:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:49 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x4000}}}}}}}, 0x0) 20:55:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwritev(r1, &(0x7f0000000500)=[{0x0}, {0x0}], 0x2, 0x4800000000000) gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd000071185400000000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b76890152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb504d4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f7396bc0f0000000000001069f22c3bdbac28523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa2b04df0aee378c5aaf2aa19fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d00000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1ff}, 0x10}, 0x78) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8, 0x100000000}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1342.384691][ T277] tipc: TX() has been purged, node left! 20:55:51 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b8, 0x0, 0x4c, 0xf0, 0xf0, 0x0, 0x1e8, 0x200, 0x200, 0x1e8, 0x200, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'bridge_slave_0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x318) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = accept4(r1, &(0x7f0000000500)=@tipc, &(0x7f0000000580)=0x80, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000a00)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f00000009c0)={&(0x7f0000000600)={0x5c, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x7ff]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_ALGID={0xfffffffffffffd67, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x0, 0x9, 0x8]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) 20:55:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x6c, 0x8100, r6}}, 0x20}}, 0x0) 20:55:51 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6000}}}}}}}, 0x0) 20:55:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000400140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000140), 0x4) sendmsg$nl_route(r10, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x24, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0) 20:55:51 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6d00}}}}}}}, 0x0) [ 1343.995543][T21252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1344.071418][T21253] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1344.090533][T21257] IPVS: ftp: loaded support on port[0] = 21 [ 1344.112093][ T27] audit: type=1804 audit(1589144152.141:1749): pid=21256 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1192/cgroup.controllers" dev="sda1" ino=16384 res=1 20:55:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xe803}}}}}}}, 0x0) 20:55:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x1000000}}}}}}}, 0x0) 20:55:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3000000}}}}}}}, 0x0) 20:55:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x5000000}}}}}}}, 0x0) [ 1344.733616][T21262] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1344.819138][T21258] device syz_tun left promiscuous mode [ 1344.824916][T21258] bridge5: port 1(syz_tun) entered disabled state [ 1344.860962][T21262] IPVS: ftp: loaded support on port[0] = 21 [ 1344.965539][ T27] audit: type=1804 audit(1589144152.991:1750): pid=21289 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1193/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1344.997682][T21258] bridge8: port 1(syz_tun) entered blocking state [ 1345.005447][T21258] bridge8: port 1(syz_tun) entered disabled state [ 1345.053981][T21258] device syz_tun entered promiscuous mode [ 1345.085289][T21259] bridge211: port 1(bond0) entered blocking state [ 1345.094080][T21259] bridge211: port 1(bond0) entered disabled state [ 1345.115007][T21259] device bond0 entered promiscuous mode [ 1345.123534][T21259] device bond_slave_0 entered promiscuous mode [ 1345.136417][T21259] device bond_slave_1 entered promiscuous mode [ 1345.160245][T21252] bridge8: port 1(syz_tun) entered blocking state [ 1345.166801][T21252] bridge8: port 1(syz_tun) entered forwarding state [ 1345.189721][T21252] bond0: (slave bridge8): Enslaving as an active interface with an up link [ 1345.204917][T21264] device bond0 left promiscuous mode [ 1345.212779][T21264] device bond_slave_0 left promiscuous mode [ 1345.219653][T21264] device bond_slave_1 left promiscuous mode [ 1345.226257][T21264] bridge211: port 1(bond0) entered disabled state [ 1345.411144][T21280] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1345.450562][T21253] bridge211: port 1(bond0) entered blocking state [ 1345.464828][T21253] bridge211: port 1(bond0) entered disabled state [ 1345.501359][T21253] device bond0 entered promiscuous mode [ 1345.516489][T21253] device bond_slave_0 entered promiscuous mode [ 1345.524592][T21253] device bond_slave_1 entered promiscuous mode [ 1345.535384][T21286] device bond0 left promiscuous mode [ 1345.541201][T21286] device bond_slave_0 left promiscuous mode [ 1345.547310][T21286] device bond_slave_1 left promiscuous mode [ 1345.553561][T21286] bridge211: port 1(bond0) entered disabled state 20:55:56 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @rand_addr=0x64010100}, 0x2, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='erspan0\x00', 0xa98, 0xffffffffffff1fd9, 0x7f}) 20:55:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6000000}}}}}}}, 0x0) 20:55:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x74, 0x8100, r6}}, 0x20}}, 0x0) 20:55:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1d616ae200001cca613554b05ea77079cafcd02a22034a870401ae14ec89425718ac53c1db02018ebef97bbc71b65be9d5fc5cb0c2bd91e169fc87de4fa18b4ba1f6bcab01a317f8f98c1a941d8db714262e3c5fbb2ffce39053b12936c4b44f7db9e4d8cad9c5db51be6387f899cddcf341025f9b118648a56e2bcc108a2a00a5164e33994fc987a9318cf7d9d493b193559fe1cea2d532abaab43fac88fc52eef6750bc6cb8eca0fcc1418ec4e2e5cd111f70c511a8b3fec"], 0x6) recvmmsg(r1, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000023c0)=0x1ff, 0x4) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x38, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x4}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xf}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0xc}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8841}, 0xc001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r'], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x900, &(0x7f0000000240)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x74, 0x0, 0x3}}, 0x20}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)=@newchain={0x1a54, 0x64, 0x4, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0xb}, {0xffe0, 0x4}, {0x4, 0xffff}}, [@TCA_CHAIN={0x8, 0xb, 0x201}, @TCA_RATE={0x6, 0x5, {0x3, 0xf7}}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x1a0c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x6, 0x0, 0x9, 0xfa41, 0xff, 0x3fc, 0x3, 0xfffffe00, 0x99, 0x800, 0x1000, 0x1, 0x4, 0x7, 0x6b5, 0xbce, 0x1, 0xfffffe01, 0x0, 0x1, 0xa39c, 0x62, 0x8, 0x3f, 0x1ff, 0x6, 0x80, 0x20, 0x800, 0x0, 0x3ff, 0x40, 0x80000001, 0x6, 0x3fff8, 0x9, 0xffff8001, 0x9b6, 0x7, 0x7fff, 0x7ff, 0x0, 0xffffff50, 0x4, 0x0, 0x7, 0xf67, 0x9, 0x9, 0x383, 0x8, 0xab, 0xca9, 0x200, 0x7, 0x8, 0x480, 0x1, 0x2, 0x4, 0x4, 0x1000, 0x10d0, 0x7, 0x2, 0x5, 0x9, 0xa2, 0x1000, 0x6, 0x4, 0xffff, 0x662e, 0xffffff00, 0x5, 0x8, 0x9, 0x6, 0x7b385897, 0x400, 0x9, 0x8, 0x8, 0x41, 0xc5, 0x1, 0x1, 0x7fffffff, 0x3, 0x8000, 0x8001, 0x7, 0x0, 0x0, 0x5, 0x8000, 0x80000001, 0x3ff, 0x40, 0x7, 0xbb8, 0x5, 0x6dd80d07, 0x0, 0x6, 0x1, 0x0, 0x8001, 0x1827, 0x7, 0x1, 0x6, 0x80000000, 0x3, 0x1ff, 0x6, 0x35d9, 0x6, 0x9, 0x1000, 0x9, 0x84, 0x7fffffff, 0x3, 0xa67, 0xff, 0x6, 0x8001, 0x8, 0x3, 0x10000, 0xff, 0x1b40d8b8, 0x2, 0x6, 0x8, 0x5, 0x5, 0x20, 0x2, 0x7ff, 0x9, 0xfffffff9, 0x80000001, 0xffff, 0x7, 0x1, 0x7, 0x472995f6, 0x2, 0x574, 0x1, 0x0, 0x80000001, 0x875, 0x96bd, 0x9, 0x5, 0x8, 0x6, 0x5, 0x20, 0x0, 0xfffffff8, 0x1, 0xfffffffb, 0x80000000, 0x13, 0x800, 0x7, 0x2, 0x6, 0x2, 0x1ff, 0x2, 0x7ff, 0x3, 0x8ec, 0x3, 0x8, 0x4, 0x5, 0x40, 0x400, 0x7f, 0x200, 0x0, 0x6dc, 0x0, 0x5, 0x100, 0xffffffc0, 0x100, 0x3, 0x9, 0x49, 0x7ff, 0x32, 0x7, 0xfffffffa, 0x81, 0x3, 0x20, 0x2, 0x2d44, 0x2, 0x2, 0x1ff, 0x4, 0x81100000, 0xf12c, 0x200, 0x7, 0xff53, 0x8, 0x40, 0xb361, 0x7fcc, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x5, 0x7f, 0x4, 0x3f, 0x9, 0x8001, 0xff, 0x5, 0x80, 0x1, 0x100, 0x8, 0xc4, 0x3, 0x80, 0x200, 0x0, 0x0, 0x171, 0xffffffff, 0x7, 0x1ff, 0xfffffffc, 0x0, 0x80000001, 0x7, 0x7fffffff, 0x10000, 0x40, 0x3ff, 0xfffffffe, 0x11a]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7f, 0x9, 0x7fffffff, 0x200, 0x4, 0xde, 0x4000, 0x9f, 0x2a4, 0x7f, 0x4, 0x8, 0x4, 0x9, 0x1000, 0x1, 0x7, 0x8001, 0xbb, 0xf469, 0x80, 0x7fff, 0x5, 0x1, 0x304b, 0x8001, 0x200, 0x51, 0x3, 0x1000, 0x97, 0x9, 0x7, 0x7, 0x6, 0x5cf, 0x3f, 0x4, 0x0, 0x66d, 0xa545, 0x5, 0x5, 0x1f, 0x7, 0xffffffe0, 0x0, 0x8, 0xfffffffe, 0x3, 0x1, 0x5cf, 0x1ff, 0x72c, 0xa83, 0x8000, 0xffffff80, 0x4, 0x339, 0x1ff, 0x5, 0x7fff, 0x6, 0xff, 0x400, 0x7fff, 0x7, 0x5, 0x20, 0x5, 0x7, 0x5, 0xccfd, 0x1, 0x4, 0xfff, 0xfff, 0x8, 0x2000000, 0x5, 0x3, 0x3, 0x440901c4, 0x42b, 0x80000000, 0x8001, 0xffffffff, 0x90, 0x2, 0x800, 0x1f, 0x2, 0x80000000, 0x7, 0x7f, 0xffffffc1, 0x5, 0x5, 0x1, 0x400, 0x6e45, 0x8, 0x0, 0x0, 0x2, 0x7fffffff, 0x0, 0x6, 0x2765, 0x9, 0x5, 0xff, 0x80, 0xff, 0x0, 0x3ff, 0x101, 0x1, 0x5, 0x80000000, 0x5, 0x6, 0x0, 0x200, 0x3, 0x10000, 0x101, 0xff, 0x8, 0x8174, 0x6, 0x4, 0xfffffe00, 0x80, 0x1f, 0x0, 0x9, 0x9, 0x3e27, 0x8, 0x9389, 0xc17978f, 0x0, 0x8, 0x7fff, 0x10001, 0x0, 0x10000, 0x8001, 0x9, 0x800, 0x0, 0x1f, 0x976b, 0x9, 0x0, 0x7ff, 0x4, 0xa8, 0x6, 0x8, 0x1, 0x5, 0xa0a, 0x6, 0x6, 0x8001, 0x40, 0x8, 0xfff, 0xfffffffa, 0x7ff, 0x4, 0x1, 0x3, 0x340, 0x8000, 0x6, 0x1, 0x9, 0x401, 0x7, 0x6, 0x76ac, 0x3, 0x6, 0x4, 0xc2, 0x100, 0x9, 0x400, 0x8, 0x2, 0x9, 0x4, 0x4, 0x8, 0x1, 0xc9, 0x0, 0x3a0, 0x9, 0xed, 0x587a, 0x8, 0x1, 0x7b51, 0x6, 0x2, 0x20d3471a, 0x8000, 0x3, 0x12, 0x465c998d, 0x5, 0x5, 0x8f5, 0x9, 0xffffffff, 0x0, 0xbb, 0xfffff3c8, 0x8000, 0x795, 0x8001, 0xf0d, 0x1, 0x1, 0x3ff, 0x1, 0x80000000, 0x7, 0x7f, 0x2, 0x7, 0x53, 0x649c, 0x1, 0x3, 0x66, 0x5, 0x0, 0x8, 0x9, 0x5, 0x401, 0x6, 0x3, 0x10000, 0x6, 0x3, 0x0, 0x4, 0x7f, 0xfffffffd, 0x8bf]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x8, 0x5, 0x8001, 0x0, {0x1f, 0x0, 0x7be, 0x4, 0x8001, 0x8}, {0x3, 0x1, 0x1f, 0x5, 0x3f, 0xffffffff}, 0x3, 0x5, 0x8}}]}, @TCA_BASIC_EMATCHES={0xc8, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb0, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0xc54, 0x2, 0x4}, {0x0, 0x3, 0x0, "1aeba6"}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0xe094, 0x2, 0x3354}, {0x7, 0x0, 0x2}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x4, 0x7, 0x5}, {{0x4, 0x0, 0x1, 0x1}, {0x3, 0x0, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x7, 0x1, 0x4}, {0x8, 0x4, 0x400, 0x2, 0x2, 0x0, 0x1}}}, @TCF_EM_IPT={0x18, 0x2, 0x0, 0x0, {{0xf2a6, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}]}}, @TCF_EM_META={0x3c, 0x1, 0x0, 0x0, {{0x2, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x401, 0x12, 0x1}, {0x6, 0x1, 0x1}}}, @TCA_EM_META_LVALUE={0x5, 0x2, [@TCF_META_TYPE_VAR='y']}, @TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_VAR="9a6ebccf06", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="e3b39baa", @TCF_META_TYPE_VAR='A7', @TCF_META_TYPE_VAR="2b908e0b118e28"]}]}}]}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x400, 0x8, 0x4}, {0x1, 0x0, 0x5}}}]}]}, @TCA_BASIC_EMATCHES={0xc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5}}]}, @TCA_BASIC_EMATCHES={0x5c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x30bb}}, @TCA_EMATCH_TREE_LIST={0x50, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x32b, 0x3, 0x800}, {0x7ff, 0x9, 0x8, 0xfffffffd}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x40, 0x3, 0x1}, {0x2, 0x5, 0x6, 0x200}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x5000, 0x2, 0x1000}, {0x9, 0x1, 0x2, "aa"}}}]}]}, @TCA_BASIC_EMATCHES={0x10c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_LIST={0xb4, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x8}, {0x1, 0x2, 0x3}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x1, 0x8, 0x1779}, {0x0, 0x1, 0x2}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x1, 0x8, 0x40}, {0x0, 0x2, 0x5}}}, @TCF_EM_CONTAINER={0x70, 0x3, 0x0, 0x0, {{0x6, 0x0, 0x80}, "1494e076d1904c350d7f7cf817da0bb6889625496cddc809d98de1f6b94f651786bd2450517ecc639c0be181a46666ae809e51314b0e92d38bf9b6c6b6bf37ee95f57c502695d359076fb0a616178847098054a5743635646d41a86a17377df6774b"}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xfff7, 0x8, 0x6}, {0x4, 0x2, 0x4}}}]}, @TCA_EMATCH_TREE_LIST={0x44, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x1, 0x0, 0x0, {{0x7f, 0x2, 0x3}, {0xffffff96, 0x0, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0xde1, 0x7, 0x6}, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x0, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x0, 0x1, 0x5bf}, {0x1ff, 0x9, 0x8, 0x0, 0xa, 0x2}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}, @TCA_BASIC_EMATCHES={0x348, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x2fc, 0x2, 0x0, 0x1, [@TCF_EM_META={0x94, 0x2, 0x0, 0x0, {{0x2f7, 0x4, 0x401}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x8, 0xe3}, {0x7d, 0xff, 0x2}}}, @TCA_EM_META_LVALUE={0x12, 0x2, [@TCF_META_TYPE_VAR="323ccae797ee", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x4]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xfff8, 0x1}, {0x200, 0x6}}}, @TCA_EM_META_LVALUE={0x5, 0x2, [@TCF_META_TYPE_VAR="a1"]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="16c7235685c3ce", @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="3f24c88932"]}, @TCA_EM_META_RVALUE={0x10, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x401, 0x4b}, {0x40, 0x33, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0xffff, 0x7f}, {0x3, 0x81}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7f, 0x5}, {0x4, 0xe9, 0x2}}}]}}, @TCF_EM_NBYTE={0x1c, 0x3, 0x0, 0x0, {{0x7, 0x2, 0x40}, {0x5, 0xa, 0x0, "69d2b96d4ea161e10235"}}}, @TCF_EM_CONTAINER={0xdc, 0x2, 0x0, 0x0, {{0x4, 0x0, 0x7ff}, "df3ed9aad657408888ea7a2f31e8dbd00e3c65089a42571e00d4a7401c5ec4d8f93d0f828055df025a45bc45fbfef305ba2ffd35a514091bb5c679df48ecd78548f788aeeef90820077153abad369f16c549c82d495df647913ad3f8c59c54ee475932584f6fa45f1eb2a83a7f10ba57980ad70abe6cc2d07204675b8cd03f370605b83ab2b5e7fcf8ad32a40adba4588433900342fa6d647eeaa2a497365775144409f7fce1d078d6f315f91f41944a41eb60406ca86b4983b97d88f2b8e07eb75e2b6ed398023a8912cc7c58c6d1"}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x8, 0x7, 0x6}, {{0x1, 0x1}, {0x3, 0x0, 0x0, 0x1}}}}, @TCF_EM_META={0xb0, 0x1, 0x0, 0x0, {{0x8dc0, 0x4, 0x5}, [@TCA_EM_META_RVALUE={0x16, 0x3, [@TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_INT=0x3, @TCF_META_TYPE_VAR="ae0409", @TCF_META_TYPE_VAR="0c8f79"]}, @TCA_EM_META_RVALUE={0x23, 0x3, [@TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="10dc", @TCF_META_TYPE_VAR="b224a0124b", @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_VAR="5468a5f06fc8", @TCF_META_TYPE_VAR="ecf8c743d040b4", @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_VAR="840bf7c7c0165f", @TCF_META_TYPE_INT=0x6]}, @TCA_EM_META_RVALUE={0x25, 0x3, [@TCF_META_TYPE_VAR="818c6cbda9", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="1784c5beef883b02", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="f8a70a2eace695f5", @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x1f, 0x7, 0x1}, {0x1, 0xfc, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x101, 0x7f, 0x1}, {0x20, 0x3, 0x2}}}]}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x9, 0x7, 0x2}, {{0x0, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x20, 0x1, 0x3}, {0xffff, 0x4, 0x7, 0x4, 0x1, 0x1, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8, 0x7, 0x318}, {{0x1, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}}}, @TCF_EM_CONTAINER={0x4c, 0x3, 0x0, 0x0, {{0x0, 0x0, 0xa1}, "2505e2c1d2ebd52479b0e0ca0b6fde7d43afa9b69e35d1a060edcb269d0596b120097bd6812d38f72decb1933d52179ae5e6d9ce8a4b80a28e2ed82a68"}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x247, 0x3, 0x22e}, {0xff, 0x28, 0x6, 0x68}}}]}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x9, 0x7, 0x8001}, {{0x3, 0x1, 0x1, 0x1}, {0x4, 0x1}}}}]}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x9, 0x3, 0x4}, {0x3, 0xbd20, 0x0, 0x80000000}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x101}}]}, @TCA_BASIC_EMATCHES={0x27c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x118, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xe4, 0x1, 0x0, 0x0, {{0x996, 0x0, 0x7}, "71159e8a64d9a41f6603493f04cabe8ce55c1d08a23fb8621cd5a512c5fbd6f29d9b3a0e0f291dcd259d221e65e9cad42441305594910d19c1763453ddc7dfdbdf9f79c360453f3908c2c291f6e3ceb9e89394cf723e2d53d952c51451b8c7aaa98e1b6b1093abef1253bf8fe539274ca5bb4be70da6ed608537c9bb214b2b8b9d8543995c78fe112ea10e92c9f2deb8e14e7ae0642732397e6f3f88803a4304421a8293408da6cc1cc53cb491bc1256437502ffbd50f4a5fc2c883b5a81b0a95ff210a6727451b4e760494219785759dba87504abf16863"}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x9, 0x2, 0x7}, {0x1000, 0x4, 0x1, "1874934e"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x8, 0x1, 0x7fff}, {0x48000, 0x0, 0x101, 0x1, 0x3, 0x1}}}]}, @TCA_EMATCH_TREE_LIST={0x144, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x3f, 0x7, 0x3}, {{0x3, 0x0, 0x1}, {0x4, 0x0, 0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x80, 0x8, 0x1}, {0x4, 0x6}}}, @TCF_EM_META={0x1c, 0x2, 0x0, 0x0, {{0x3ff, 0x4, 0x8}, [@TCA_EM_META_RVALUE={0x10, 0x3, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="39c4b7dd525dd7e8"]}]}}, @TCF_EM_CONTAINER={0xb4, 0x2, 0x0, 0x0, {{0x400, 0x0, 0x1}, "6a7b9b60bd1a5be133fd1e91bb518bd2ea50bc99d606c0c722a16490559fa3c9182b5cd74d70378ed75448f379e8c8169206a192a5998249d4cae316cce79272448dd7343be849e4a885295cc3955c2468ef92ac838fe5b834d69e870e1f3dad14f73107ab79784f982159a1f4ac79ad6f8f708e713b7291d1f79703ffe9488296172862e1b81a67ed3d4defc8dc88e6f490503184262310edd7f6e8a036cf382b70b887d45db1"}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x400, 0x2, 0x6}, {0xf452, 0x3, 0x0, "8d41f7"}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x171c, 0x7, 0x7}, {{0x3, 0x1, 0x1}, {0x0, 0x0, 0x1}}}}, @TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0xffff, 0x9, 0x4}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xa0}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1f}}, @TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x200}, {0x0, 0x2, 0x7}}}]}]}, @TCA_BASIC_EMATCHES={0x2bc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x168, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xa8, 0x2, 0x0, 0x0, {{0x3, 0x0, 0x4}, "68230823a5af8f5b3f23f8eb5e829106e6cfb1f00fbb9e52844cc91973ecc20c1dfc3b19b74f2ffc655937b9636534cd863d33f7f78558e2d4c30dd155174737585f264cc13b492dfb52e5b40bc09cb23de556f627f71d93d792a41b9ec708c2606c4a2508ec16dba6e9066ad7750bfcda3b8c6ba1f8040821e750ac09f46866482d6cbbe628c27adfeec09ab7b7e02d2bd8b7013689dba6bc580e"}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x8, 0x1, 0x3}, {0x6, 0x80, 0x100, 0x3, 0xc}}}, @TCF_EM_IPT={0x68, 0x1, 0x0, 0x0, {{0xdf, 0x9, 0xff}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xe0}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x1}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}]}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x0, 0x7, 0x8}, {{0x2, 0x1, 0x0, 0x1}, {0x1, 0x0, 0x1}}}}, @TCF_EM_META={0x28, 0x3, 0x0, 0x0, {{0x2, 0x4, 0x4}, [@TCA_EM_META_LVALUE={0x1b, 0x2, [@TCF_META_TYPE_VAR="9c63dfd251bfea", @TCF_META_TYPE_VAR="ede0", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT, @TCF_META_TYPE_VAR="20eb", @TCF_META_TYPE_INT=0x4]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xd3fc}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5}}, @TCA_EMATCH_TREE_LIST={0x140, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x1, 0x8, 0x20}, {0xffffffffffffffff}}}, @TCF_EM_IPT={0x12c, 0x3, 0x0, 0x0, {{0x1f}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x95}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x81}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_DATA={0xd9, 0x5, "2873fc620f0be8587dcaf49fb8a46161b638e2ed6d35b7593b24ddb2cc48b495cca98d653b5c403c850cab6c2fa73f776a141836256ec4f4797e6c7a5ff4988f4554b81c18f9e31e472330a09869325196c6f3f7e11b2f60d51d667d3b0b4e9fb9b802a6db14205654225d8c03bcb45b1b9a315f60becf899403fd14c34b9de49c682adf015359d27a168723f03b38a6b509d1938cd3ef9e8d9a618c1e51fc64f769d2f881e27d82a77159088f40f7ee8da5705f6f333925fc5542e87268eb834c84ab33a23eee706d19f4396e1560753c9e488fdc"}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}]}]}, @TCA_BASIC_ACT={0x2fc, 0x3, [@m_vlan={0x9c, 0x10, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x64, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x88d}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x97e}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x4, 0x8, 0x20000000, 0x7fffffff, 0x100}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x8, 0x5, 0x1, 0x9, 0xaf6}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0x26, 0x6, "086721ef0f10ec8bd19d170456fe890a0fd88e832047a139ec69c0743041df66c359"}}}, @m_nat={0x170, 0x3, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x7c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x8, 0x2, 0x3, 0x2}, @local, @empty, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x80000001, 0x1, 0x6, 0x8, 0xfff}, @empty, @local, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x3916, 0x0, 0x5, 0x3}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff}}]}, {0xe5, 0x6, "d04bf010cbbbf45bd5dd2b057e9f32ed88d42f7480feac79e2fd84283d70ec4c7d7f5e10231609b196ed3483a5ec5361d7041e2436dfb7b8ee0f5780c4e1870d7e17a56119db8847976cae0957e420f6dc52b0a7995a242823b13f620b7dd56b046904711ec875ffbd51e54cdebc53717ffe2d8b41821181e32f56b56728334390f3e352ca1f51cb7d1638d8c1409d36d462f6cb5b71c279d65bf12547d0d47f2cd7d001545110ce161eeb9e19c761988b38f0ccccbed962acd6c242404a8158d9cfc71cc463d0c727b1f4dde8678dfd415f808499f1888c8fc8eeed24ee3b31b3"}}}, @m_vlan={0x70, 0xe, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x51, 0x6, "20432defa6dc815750c996ebfb9d13c39083825dec8710bf261763f9dae415983f14a7aa2fd6ad9f461fc6a5086ff1c9cc5e220efc13a9d9cd512a60fe7d36d6574ab30e5868126ade16436abe"}}}, @m_vlan={0x7c, 0x3, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x1e4}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x58, 0x6, "d64cf4a0eb42d4550b1784b4a3ac9afc1997f47ea03d77f2318552821d463297ec0cb0bf3e3b84e6da6c5d4e4b7472f57c465ade8f056654219bf24aba80df5fce5aa6c75be427dc175baa279d32dd15581e5d39"}}}]}, @TCA_BASIC_POLICE={0x408, 0x4, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x47, 0xbd, 0x3f, 0x8, 0x3, 0x1, 0xffffffff, 0xfffff549, 0xffffffff, 0xfffff4d0, 0x80000001, 0x1, 0x0, 0xfffffffd, 0x11, 0x1, 0x0, 0x6, 0x1, 0x2, 0x7, 0x8, 0x8, 0x3, 0xffff, 0xd8a5, 0x8, 0x5, 0x7, 0x4, 0xff, 0x2ab6, 0x8, 0x2, 0x4, 0x8, 0xaba80000, 0xfffffffa, 0x8001, 0x3, 0x6, 0x2, 0x7, 0x100, 0x70c, 0x7fffffff, 0x7ff, 0x7a4, 0x5, 0x40, 0x9, 0x9, 0x4, 0x4, 0xf07, 0x0, 0xd05c, 0x7, 0x4e, 0x40, 0xb6, 0x4, 0x7ff, 0x7, 0x9, 0x3, 0x0, 0xd1, 0x0, 0x9, 0x40, 0xfff, 0xffffffff, 0x8, 0x0, 0xfff, 0x1, 0x1, 0x9, 0x4, 0x17, 0x5, 0x3, 0x200, 0x10001, 0x10001, 0x1, 0x8, 0xffffffff, 0x2, 0x8, 0x0, 0xce1, 0x6, 0xffffffff, 0x272a, 0xa2, 0x2, 0xe4, 0x6, 0x8, 0x2, 0x5, 0x6, 0x2fb, 0xfff, 0x1, 0x1, 0x7c00000, 0x1, 0xffffff01, 0xc0, 0x21, 0x6, 0x2, 0x8e2a, 0x1000, 0x9, 0x5b25, 0x8, 0x3, 0x5, 0x0, 0x2, 0x5, 0xffffffff, 0x2, 0x8, 0x4c62, 0x8, 0x5, 0x6, 0x7fffffff, 0x9, 0x7, 0x1, 0x9, 0x9, 0x9, 0x0, 0x4, 0x212, 0x7, 0x27db, 0x9, 0x8d82, 0x6, 0x10000, 0x4, 0x1, 0x17bb3834, 0x8, 0x2, 0xffffff2d, 0x3, 0x20, 0x0, 0x200, 0x2, 0x101, 0x1, 0x3, 0x87dc, 0x10000, 0x4, 0x3, 0x2, 0x7fff, 0x2, 0x1, 0xfffffffd, 0x0, 0x200, 0x0, 0x9, 0x9, 0x9, 0x1f, 0x1, 0x3f, 0x8, 0x3f, 0x93ab, 0x41e8, 0x2, 0x5, 0x5, 0x3e, 0x9, 0x8000, 0xffa3, 0x8, 0x8, 0x71b, 0xe90d, 0x0, 0x9, 0x81, 0x2, 0x1, 0x8000, 0xfff, 0x1f, 0xa12, 0x401, 0x3, 0x3, 0x100, 0xe12fc168, 0x10001, 0x7fffffff, 0x38cf, 0xff, 0xeb9a, 0x37, 0x7, 0x11, 0x81, 0xa96, 0x1000, 0x2, 0xc93, 0x8, 0x8b5, 0x23addc5e, 0x5, 0x0, 0x8, 0x8, 0x80, 0x573, 0xfff, 0x3, 0x1, 0x3, 0x3aac0000, 0x14e, 0xdf66, 0xfffffffe, 0xc6, 0x6, 0x8, 0xfffffffb, 0xb1, 0x80000000, 0x31, 0x400, 0x5, 0xb2, 0x4, 0x7fffffff, 0x8, 0x8, 0x5, 0xc52f]}]}]}}]}, 0x1a54}}, 0x90) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={@private0, 0x80}) listen(0xffffffffffffffff, 0x100) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) sendfile(r3, r2, 0x0, 0x100000e00) 20:55:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x7000000}}}}}}}, 0x0) [ 1348.248424][T21327] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1348.311823][T21335] bridge211: port 1(bond0) entered blocking state [ 1348.319430][ T27] audit: type=1804 audit(1589144156.341:1751): pid=21326 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1194/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1348.351354][T21335] bridge211: port 1(bond0) entered disabled state 20:55:56 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'veth0_macvtap\x00'}, {0x20, 'macsec0\x00'}, {0x20, 'connbytes\x00'}, {0x20, ')keyring'}, {0x20, 'ipvlan0\x00'}], 0xa, "9372091647126ab9ed6947dd169713d4b670ed12542e5a6fbd28da29778149734d7f1655ba86e226cc16cd8804cb64855feba3f4a77cbf868d5fdfd0ac00620414246206b58060f17b9439d1fcb19619acaa69da6cd6aace1d25ece57d409396803f442250b4"}, 0xa6) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') r1 = socket(0x1, 0x2, 0x9) socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_int(r2, 0x0, 0x7, &(0x7f0000000040), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x3b4, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000604], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x0, 0x2, [{0x3, 0x50, 0x0, 'ip6tnl0\x00', 'vlan0\x00', 'veth1_to_hsr\x00', 'bridge0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0xae, 0x126, 0x156, [@connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x7}, {0x1ff}], 0x2, 0x2}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x1, 0x360, 0x3f, 0x1, 0x0, "5e3a61e83ac5997df74da2f3eea99a7888d569dfd8a2707c21f99a90993c81e9cfb9eab863770c5a2105b9acbe18258d47367c84d1582620d13114dc11875b99"}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}, {0x5, 0x30, 0xcc89, 'ipvlan0\x00', 'ip6gre0\x00', 'veth0_macvtap\x00', 'macsec0\x00', @broadcast, [0x0, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x196, 0x196, 0x1ce, [@comment={{'comment\x00', 0x0, 0x100}}], [], @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2}]}, 0x42c) [ 1348.382609][T21335] device bond0 entered promiscuous mode [ 1348.404734][T21335] device bond_slave_0 entered promiscuous mode [ 1348.421946][ T27] audit: type=1804 audit(1589144156.451:1752): pid=21340 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/898/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 1348.456463][T21335] device bond_slave_1 entered promiscuous mode 20:55:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x8000000}}}}}}}, 0x0) 20:55:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x4, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x78) 20:55:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x31000000}}}}}}}, 0x0) 20:55:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3d000000}}}}}}}, 0x0) [ 1349.003256][T21327] device bond0 left promiscuous mode [ 1349.009023][T21327] device bond_slave_0 left promiscuous mode [ 1349.025564][T21327] device bond_slave_1 left promiscuous mode [ 1349.041130][T21327] bridge211: port 1(bond0) entered disabled state 20:55:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x3f000000}}}}}}}, 0x0) [ 1349.069969][ T27] audit: type=1804 audit(1589144157.102:1753): pid=21361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1195/cgroup.controllers" dev="sda1" ino=16052 res=1 20:55:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x40000000}}}}}}}, 0x0) [ 1349.239906][T21365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1349.286911][T21335] bridge211: port 1(bond0) entered blocking state [ 1349.301194][T21335] bridge211: port 1(bond0) entered disabled state 20:55:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x60000000}}}}}}}, 0x0) [ 1349.328991][T21335] device bond0 entered promiscuous mode [ 1349.351209][T21335] device bond_slave_0 entered promiscuous mode [ 1349.363972][T21335] device bond_slave_1 entered promiscuous mode [ 1349.389850][T21368] device bond0 left promiscuous mode [ 1349.395238][T21368] device bond_slave_0 left promiscuous mode [ 1349.416506][T21368] device bond_slave_1 left promiscuous mode [ 1349.433047][T21368] bridge211: port 1(bond0) entered disabled state 20:55:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x7a, 0x8100, r6}}, 0x20}}, 0x0) [ 1349.852815][T21396] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1349.873232][T21396] bridge211: port 1(bond0) entered blocking state [ 1349.879802][T21396] bridge211: port 1(bond0) entered disabled state [ 1349.888279][T21396] device bond0 entered promiscuous mode [ 1349.893838][T21396] device bond_slave_0 entered promiscuous mode [ 1349.901645][T21396] device bond_slave_1 entered promiscuous mode [ 1349.913574][T21396] device bond0 left promiscuous mode [ 1349.919562][T21396] device bond_slave_0 left promiscuous mode [ 1349.925639][T21396] device bond_slave_1 left promiscuous mode [ 1349.933065][T21396] bridge211: port 1(bond0) entered disabled state 20:55:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xffffffff, 0x24, &(0x7f0000000180)=""/36, 0x40f00, 0x8, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000200)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0xffffffff, 0x9b}, 0x10}, 0x78) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x6d000000}}}}}}}, 0x0) 20:55:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x40014) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20001732, &(0x7f00000003c0)={0x2, 0x4e20, @local}, 0x10) [ 1350.148700][T21409] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:55:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x8dffffff}}}}}}}, 0x0) [ 1350.234649][T21396] bridge211: port 1(bond0) entered blocking state [ 1350.243887][T21396] bridge211: port 1(bond0) entered disabled state [ 1350.259837][ T27] audit: type=1804 audit(1589144158.292:1754): pid=21407 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1196/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 1350.272189][T21396] device bond0 entered promiscuous mode 20:55:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000250800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c973fbffea87c8264cc76b2966793801080000000000000000000"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r5, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x40, r6, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @loopback}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x40}}, 0x8000) sendmsg$NLBL_MGMT_C_LISTALL(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x4c, r6, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0xa, 0x1, 'em1^&\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x28}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0xc0) [ 1350.387359][T21396] device bond_slave_0 entered promiscuous mode [ 1350.399733][ T27] audit: type=1804 audit(1589144158.432:1755): pid=21408 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/899/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1350.423474][T21396] device bond_slave_1 entered promiscuous mode 20:55:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xe8030000}}}}}}}, 0x0) [ 1350.463910][T21413] device bond0 left promiscuous mode [ 1350.473010][T21413] device bond_slave_0 left promiscuous mode [ 1350.517598][T21413] device bond_slave_1 left promiscuous mode [ 1350.538192][T21413] bridge211: port 1(bond0) entered disabled state 20:55:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r1, 0x0, 0x100000002) 20:55:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xf5ffffff}}}}}}}, 0x0) 20:55:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xffffff8d}}}}}}}, 0x0) [ 1350.708549][T21433] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1350.764657][T21436] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1350.840023][ T27] audit: type=1804 audit(1589144158.872:1756): pid=21444 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1197/cgroup.controllers" dev="sda1" ino=16041 res=1 20:55:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8102, r6}}, 0x20}}, 0x0) [ 1351.144750][T21433] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1351.155017][T21436] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1351.257525][T21464] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:55:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:55:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xfffffff5}}}}}}}, 0x0) 20:55:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e2c, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(r3, r0, 0x0, 0x8000000000004) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003480), 0x0, 0x0, 0x0) gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r4, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) 20:55:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 20:55:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) pwritev(r2, &(0x7f00000004c0), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000280)={r1, r3}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r4+10000000}, 0x0, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x4}}], 0x30}], 0x1, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000017c0)={0x0, 0x6, 0x7, 0x0, 0x2, 0x3, 0x0, 0x0, {0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x20, 0x800, 0x0, 0x100}}, &(0x7f0000001880)=0xb0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0xc) [ 1351.301312][T21464] bridge211: port 1(bond0) entered blocking state [ 1351.316218][T21464] bridge211: port 1(bond0) entered disabled state [ 1351.337547][T21464] device bond0 entered promiscuous mode [ 1351.352344][T21464] device bond_slave_0 entered promiscuous mode [ 1351.375196][T21464] device bond_slave_1 entered promiscuous mode [ 1351.412967][T21472] device bond0 left promiscuous mode [ 1351.418496][T21472] device bond_slave_0 left promiscuous mode [ 1351.441215][T21472] device bond_slave_1 left promiscuous mode 20:55:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0xffffffff}}}}}}}, 0x0) [ 1351.463786][ T27] audit: type=1804 audit(1589144159.492:1757): pid=21476 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1198/cgroup.controllers" dev="sda1" ino=16380 res=1 [ 1351.510577][T21472] bridge211: port 1(bond0) entered disabled state 20:55:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:55:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x3}}}}}}}}}, 0x0) 20:56:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:00 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x5}}}}}}}}}, 0x0) [ 1352.202562][ T27] audit: type=1804 audit(1589144160.232:1758): pid=21510 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1199/cgroup.controllers" dev="sda1" ino=16090 res=1 20:56:00 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x6}}}}}}}}}, 0x0) [ 1352.638754][T21505] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1352.699034][T21464] bridge211: port 1(bond0) entered blocking state [ 1352.708336][T21464] bridge211: port 1(bond0) entered disabled state [ 1352.743611][T21464] device bond0 entered promiscuous mode [ 1352.770950][T21464] device bond_slave_0 entered promiscuous mode [ 1352.790731][T21464] device bond_slave_1 entered promiscuous mode [ 1352.811712][T21509] device bond0 left promiscuous mode [ 1352.822167][T21509] device bond_slave_0 left promiscuous mode [ 1352.837825][T21509] device bond_slave_1 left promiscuous mode [ 1352.844367][T21509] bridge211: port 1(bond0) entered disabled state 20:56:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8103, r6}}, 0x20}}, 0x0) 20:56:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x7}}}}}}}}}, 0x0) 20:56:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) r1 = socket(0x200000000000011, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vlan0\x00'}) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x304}, "5e983c8c8c506edd", "8539039ccf7ffad13ca9de437f7f9dd5", "520ea937", "ad275e319622ea9a"}, 0x28) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syzkaller0\x00', 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x2, 0x3, 0x240, 0xd8, 0x0, 0xd8, 0x8, 0xd8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x1a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00', '\x00', {}, {}, 0x6, 0x0, 0x50}, 0x0, 0xb8, 0xd8, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x30}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f00000002c0)={0x1, 0x1, 0x1000, 0x88, &(0x7f0000000680)="84bb15b20cb7a0fb0db328b7339c4a005a6090cfa8a35ea204f6d2a92db871d52032ccbdcb41aa588894310fc26bfaa15ae84d483fca529e6bb4b2a31040cac32fb6432d8390436d909629eef48e431d736a4dcf06ade0aec311c8ecc7003d1a38d9aff0a20debc7e1903ebc23eeadf9499183fba63be681c01fb9eb2dd400edf0035aa8a7d4b8b2", 0x1000, 0x0, &(0x7f0000000740)="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"}) [ 1353.229834][T21545] xt_ecn: cannot match TCP bits for non-tcp packets [ 1353.241502][T21541] bridge211: port 1(bond0) entered blocking state [ 1353.277189][T21541] bridge211: port 1(bond0) entered disabled state [ 1353.285746][ T27] audit: type=1804 audit(1589144161.312:1759): pid=21543 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1200/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 1353.328112][T21541] device bond0 entered promiscuous mode [ 1353.356561][T21541] device bond_slave_0 entered promiscuous mode [ 1353.396677][T21541] device bond_slave_1 entered promiscuous mode [ 1353.426253][T21552] device bond0 left promiscuous mode [ 1353.441746][T21554] xt_ecn: cannot match TCP bits for non-tcp packets [ 1353.443064][T21552] device bond_slave_0 left promiscuous mode [ 1353.486687][T21552] device bond_slave_1 left promiscuous mode [ 1353.492949][T21552] bridge211: port 1(bond0) entered disabled state 20:56:01 executing program 0: r0 = socket(0x27, 0xa, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000600)="2fb563a3080da9cd069e53eb946f7fbe4cff614fe3382023ead83ac2e93514c6f9a48db1daf2497fb69a5186773abccd2df9dbde85ad0dac402136aa20a08aa9d7bab924a9d7e136c54048d1e626d5c2dd6eea99d00ef244e6ad1f3eace72e3b0261d41dec6c22d70f8c22cb07439391042c6e13e71e7ead5a790d61232c9c60ef597fb411cf03", 0x87) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair(0xf, 0x1, 0x77, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x25, 0x2, 0x1, &(0x7f0000000300)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=@newlink={0x44, 0x10, 0xc362e63b3f31ba5f, 0xffffffff, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x8805}, [@IFLA_GROUP={0x8, 0x1b, 0x3}, @IFLA_PORT_SELF={0x4}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x40a1}, @IFLA_LINK={0x8}, @IFLA_OPERSTATE={0x5, 0x10, 0x9}]}, 0x44}}, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000340)=@get={0x1, &(0x7f0000000440)=""/219, 0x5}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='rdma.current\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140), &(0x7f00000002c0)=0x4) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x65c15bf2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000000), &(0x7f0000000100)=0x4) accept$nfc_llcp(r2, &(0x7f0000000200), &(0x7f0000000280)=0x60) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000380), 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0040020000000000280012800b0001006d616373656300001800028005000600000000000c00010000000000000000000a000500140000000000000008000a00", @ANYRES32=r6, @ANYBLOB="31404e3788037a2a8cfc1b088eea9fffd59905bdaa8902701911999fe8d88a4b77dd0caeb08847a078a182d7a599308a12c658426eecc7e736ef058f749b00dbbfd3d96a3dbaf354e0860baf08bc97fb438b3313187cc0e74df0f38ebecca600e0a55929e7c80305f4e83ef83ca9535fa2bf791c"], 0x5c}}, 0x0) 20:56:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x8}}}}}}}}}, 0x0) 20:56:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0xf}}}}}}}}}, 0x0) 20:56:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x3}}}}}}}}}, 0x0) [ 1353.683536][ T27] audit: type=1804 audit(1589144161.712:1760): pid=21565 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1201/cgroup.controllers" dev="sda1" ino=16383 res=1 20:56:01 executing program 1: gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r0, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r0, 0x0) socket$inet(0x2, 0x3, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xa, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x3f, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000100)=""/56, 0x38}], 0x2, 0x0) 20:56:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x4}}}}}}}}}, 0x0) [ 1354.145851][ T27] audit: type=1804 audit(1589144162.172:1761): pid=21579 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/902/cgroup.controllers" dev="sda1" ino=15754 res=1 [ 1354.400179][T21577] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1354.456835][T21541] __nla_validate_parse: 1 callbacks suppressed [ 1354.456845][T21541] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1354.492681][T21585] bridge211: port 1(bond0) entered blocking state [ 1354.502668][T21585] bridge211: port 1(bond0) entered disabled state [ 1354.526163][T21585] device bond0 entered promiscuous mode [ 1354.556489][T21585] device bond_slave_0 entered promiscuous mode [ 1354.562879][T21585] device bond_slave_1 entered promiscuous mode [ 1354.573888][T21586] device bond0 left promiscuous mode [ 1354.580368][T21586] device bond_slave_0 left promiscuous mode [ 1354.587470][T21586] device bond_slave_1 left promiscuous mode [ 1354.594033][T21586] bridge211: port 1(bond0) entered disabled state 20:56:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8104, r6}}, 0x20}}, 0x0) 20:56:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x5}}}}}}}}}, 0x0) 20:56:02 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) write$binfmt_misc(r0, 0x0, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @ipx={0x4, 0xdb0, 0xffffffff, "5d663e7677a9", 0x4}, @l2={0x1f, 0xa2e6, @any, 0x5, 0x2}, @tipc=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x3, 0x3}}, 0x2, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000000c0)='tunl0\x00', 0x4d, 0x9}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = socket$inet(0x2, 0x3, 0x2) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000001bc0), 0x4) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) bind$inet(r4, &(0x7f0000000380)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r2}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f00000003c0)={0x1000, @broadcast}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010000fffffff50000001b00000008009a0002"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00034b25bd7000ffdb814b2aa00da54d2d21df25160000000c00990008502c49d627f994ffbf6978b0dc7f80de107a0e9de963cf6b9de65f97d5e5c241da292eee639c9739ae72bcc69245ec0aced46a9dd5aad4e3539392f4a828dc88c2f377fd277bb840d59035593ffbbee40b8e6ce8e450ad9614d8b36f4a500b6f0b5ddb00565fe471d44ae53bdbef2680d5dff413a345f423e923927a1fe3b3a27d89cf8e5c336cbda740f609488adb0b7c3cbd6ef6163e1fdd6cd5381b8e5a1db731f8b0a9cf254336413338c276fe10cb4cdb71aa0d1c844a49d0922384a298ab812533b9aaa4b2ebd7"], 0x20}, 0x1, 0x0, 0x0, 0x4044}, 0x4001085) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e26, @loopback}, {0x300}, 0x22, {0x2, 0x4e23, @multicast1}, 'macvtap0\x00'}) [ 1354.982261][T21614] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x6}}}}}}}}}, 0x0) [ 1355.054140][T21622] bridge211: port 1(bond0) entered blocking state [ 1355.098369][T21622] bridge211: port 1(bond0) entered disabled state [ 1355.118206][ T27] audit: type=1804 audit(1589144163.152:1762): pid=21628 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1202/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1355.139618][T21622] device bond0 entered promiscuous mode [ 1355.221339][T21622] device bond_slave_0 entered promiscuous mode 20:56:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x8}}}}}}}}}, 0x0) [ 1355.263240][T21622] device bond_slave_1 entered promiscuous mode [ 1355.323645][T21614] device bond0 left promiscuous mode [ 1355.329348][T21614] device bond_slave_0 left promiscuous mode [ 1355.373495][T21614] device bond_slave_1 left promiscuous mode [ 1355.417784][T21614] bridge211: port 1(bond0) entered disabled state 20:56:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x9}}}}}}}}}, 0x0) 20:56:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 20:56:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x3}}}}}}}}}, 0x0) 20:56:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="090018c99fb01535009d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d208000000c57d8873240eed0fbdfb5468653eefc571b3d6c05930bf0c443e8d5e94261078407dfc9adf4e3ab5e98e2d4f1b533f65a88cf80318e1f6be4dd15c0be12973a01523a880f445522621af85ef7eab1bc5a24a0816048511747f23329e45129fe3643365b9ded0016d7ab5fb69"], 0x3d) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x1ff, 0x9}, 0x90) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r3, 0x41}, &(0x7f00000000c0)=0x1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32=r7, @ANYBLOB="090035005a80d54e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5d"], 0x3d) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000000)={r7, 0x5, 0x800, 0x5, 0x3ff, 0x1000}, &(0x7f0000000040)=0x14) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000840)=@raw={'raw\x00', 0x3c1, 0x3, 0x2c0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@ipv6={@dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'tunl0\x00', 'nr0\x00'}, 0x0, 0x100, 0x120, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}, {0x0, 0x8}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@local, @ipv4, [], [], 'veth1_to_bridge\x00', 'bond_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) [ 1356.058418][T21622] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1356.096164][T21656] bridge211: port 1(bond0) entered blocking state [ 1356.104275][T21656] bridge211: port 1(bond0) entered disabled state [ 1356.129125][T21656] device bond0 entered promiscuous mode [ 1356.138342][T21656] device bond_slave_0 entered promiscuous mode [ 1356.159920][T21656] device bond_slave_1 entered promiscuous mode [ 1356.170479][T21659] device bond0 left promiscuous mode [ 1356.175958][T21659] device bond_slave_0 left promiscuous mode [ 1356.193070][T21659] device bond_slave_1 left promiscuous mode [ 1356.202646][T21659] bridge211: port 1(bond0) entered disabled state 20:56:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8105, r6}}, 0x20}}, 0x0) 20:56:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 20:56:04 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x5}}}}}}}}}, 0x0) 20:56:04 executing program 0: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003680)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f00000003c0)="228bbe8ab48a25ae15d1e7a1a06e4d973a5fbd9d649aed1658ba4fc6c0fbd8af387df25832d5abe12f220b28e1e55e10f37ef2a2f863646061eeb786837b1d3b626d1911d8d6284e228a5d26d2b14dbc59c9211150b4415d897a16525b426d48da0341be44f6be0d1c995514ab6c71edb00dcf4e3a2f9107cd8c347387d10dee7c7c", 0x82}], 0x1, &(0x7f0000001100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000fc054a532a814eb01ff4c4000100001002000050006aaa72da97eec8a23b6171cd1e1826e9136be1ce896eb077142d50e8a39c225357951bd8782ac31217f4ddb5546bc27116ef289e4fdea37340a21f612bd9b9bcfa79f5ba93ca36cd86ddb558a76ff7032fccee40792c19aa361929560f3c291113a05e49d756ebae77802763d66f4c4ff616a5a443ec8cb0d8e3675bf988f3572904a24574bd89133156fdd5a9000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1], 0x78, 0x80}, {&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001040)=[{&(0x7f0000000680)="5fd55d22543fd3f7cba0486845621827b4848ea636f5ca9fdc65cfe5398ae9ea12d6db64adf4b9c494397df0c9ee8e84606262438e2aecfc00a7b4133267841ea2303f4cddf05100f935dfe03afe088ec95336fed60cd199d208022bd9fed47f0b42d336914097606399acaeee4ad16aa2203cb4304f6171a87a1fa318739ef3897e524b6e07a1df29b6253efbc5829b4d471e132e92b3fba9cf4dd5f0addc4df89a3ae7aac31a79e45c8b", 0xab}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000000c00)="b7bc8a28b98fb0e4e969ad9df957b57911e3b32e5d0a7ec1414f27f69ea63ed57a3ba577872a556492e48900d3bab8a9ac881b27c694fbc0e3781da668105096cdcf719c689a4e9365191a634ab6ae8a917bc48dff2073d6b72428df4759e1c249b0295db83f0d0dfc7147ccc9fdfc1f921736cec605d20690a36bd260d45c3891ef762cb7d59ce455", 0x89}, {&(0x7f0000000cc0)="be980f89b80bfe7cd0224053388642a290342ca648cde745e4bd8f0cfccf9e049c77ff8020", 0x25}, {&(0x7f0000000d00)="7645a986170ebcf4f28c7f9dd7c52fa91268afee7f427219a94a686a6003f1942e63be8d5987107691e2299f17678c84e7b0c0edf2ef8b5c986663cc4d5a871862bb3e07025ea31cc45b4f335a071b1b75eea2a9f6d1ac6641e641ce4d76692ec263f25e06b64ac92c540e1220ca270fe7f1076aa3cb5b927d6908fef20574450042b571162a44191dc5293287e447a2bc7da6da6107372044ed3095b20c5f2906869859b48d7b7e51c105f598c6a4c41bab62426e71ce7c8edeadcd6bfb603b6f6aaa", 0xc3}, {&(0x7f0000000e00)="7eb028e56045e3943f74ef9ede97eb5c597f8c416a7299406b3e07a49558798cc75eeb84be1ff0225d2ea0322ee15e6c5d364774141f233d514fbfbfc5f01d0b5cc3e9e8730bf5f37b02e5c78f13148c644dbb4d642add1f6caa0daa2ebd9ef590d6c918d5f17f535446b2c07548d63722dc79e0cb5c71f15d", 0x79}, {&(0x7f0000000e80)="afdbced86e94c7e1311685f5d3e77fd9f7d6065b848247c83b4ad50ae38ff05b1022c32d414c9c7e9cc5a0f54558c53a80911bc96e51a4f4c762275a0d20c473db1f7f903159", 0x46}, {&(0x7f0000000f00)="5a563ed59478b5267a1d0e58c5b227bdb53bd16a5fecfebb6c858a0bd5d0af77e8513c3419b8b66b82c3612b74d5073a17d94bf401ce9a6da49196676d23ccb327081072e866c5ce3ce8877a526ae18f0ccdffbb0608ea5ec1100803c18fdcd737420addd3d85637fb7293f01115990e509ab5b05d4e1408e605864ba58f29365ed04c9a0a8ecccdc26165d825c1e60705222bc24207b8cd1fb7805fc4221786f619544b247faa8e84be681b4e6ed9a18efc7dcf2569f313adcf18d9b210a6871429583641423153acab", 0xca}, {&(0x7f0000001000)="0cc7625265b5b9492d29", 0xa}], 0x9, &(0x7f0000001440)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, r1, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0, 0x1f9a24fd544a4792}, {&(0x7f0000001500)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000001580)="b900cca418198dca72d052608fe50367e9b6142e81e751b9742ad500f04ad0ca9c6da85aedfe3e4b6c05adfc2160486e8f5ac76755816cb34370278a015a4398e09f235341d18c6fb6ff19cf416dff6bc6fa36579057a8fc1cf010f90b36c83c445905700aa05fa9c73b4d827cfcc7", 0x6f}, {&(0x7f0000001600)="dc3aa6bd20fbb15e47153ea089fd223062b9acbbc580dec91ca4beb712fb8e53543fc32a41d820e7dd546e681c607a145387b49ffa2c21aea38b271cf8d6301f3e06a261f92ab805a1ffa85f95292c03dfe2b0709488ea3514e3c615516520cd9573db74a35d9eb8111878da96cd1c3d327272a518c745e319120d34b0ea75e9e578a1f2ac594a045087f715c63749e7", 0x90}, {&(0x7f00000016c0)="8ca560ebc48dd4e8d8fa01838a3928fdf8f9e8da8be54b1fd6fb9dc8365f318a6a2db426f9052d3a040d87327a599f150030395676ce7f2df40dc6b11420c10d34222c", 0x43}, {&(0x7f0000001740)}, {&(0x7f0000002840)="5939e7fa0a3dbef61c9da9afe48b8619767b4c81ab2793f71ff23a37e22e663ea8b7aeceb3b4fa6309b7ebaa0b412c49a8df5bc95c0a44978db64e779316d94df3890e580d6baf6e8cac155ad4014baaf39bfe49ed420f473c773dd2a809dffa97f7f525c029e80f0d78a84024f5aa22c7398b329f182a604fd20db488f2ab5f348af369206465abcd995ea073bbed3855aae8f54492744ca81270226e27d842bc44337a1d2d872ce8370c42d7014736a14d5abff50b7236578bd265695453de72413d4e13d36bf5282bbdabde4835ca739b9999f11dc55cf9c2326d3691b95716da84b4d8bf73bda82bd36121b6df13fae8b6", 0xf3}, {&(0x7f0000002940)="94d06933dbf40d3a7c7e90f51575c998d84500798a4c8287a789621239b49f22574cc18e6dfc0f74718a805f3260af2d0fe5b1931d0f37d378370945255628a0b339ae75bd99a72da274b837", 0x4c}, {&(0x7f0000001780)="b18cb14bd026760194701de6d32832ac4f3c3cdd42ac2f2a156e4a15ba9535a07d9ab74358674eccb43fa837dc51fb96ca", 0x31}, {&(0x7f00000029c0)="d4b3f5c2a0f271c29eca686d46d54b5b013155c9c692345c57ba5622cc202a2bab637a4531730033e3fd3d3407bdb625c8fa4e77dc8ff4a337588601d1cd825809e6afcefe1e3f0cd16d99c5976d6b610f90746412b4e8089f441d30c444ff7e1261d28ea55e872f94682f0dcd9168b9977b4385af6c4f243317b6264a648b85ee0eec732feb90fd70d19b89893f4029b3382b7b045043b6dadcdf050c257ea5eb3e18216b60a28ae69d73dd9c1b51349b1952472f4b6d2749", 0xb9}, {&(0x7f0000002a80)="39973c99d78d233d72d885be3bc07ef63ea0e47205ec8b18d422b03a6a4c5be43fe6aede6588dc8e5488ca56cdcd336f6b4658d986f290bab02ee4c5613b415d3475baa97d8f4a7c32f2e85fe6aa04b0902ed3ffa47fbf37efea9a511d682672b2de6302aa78c46ba31486be6bb0c8c1d13aacd74105377b90dc679b322ceb80434ff92e639ba25757d727ec995c19afea", 0x91}, {&(0x7f0000002b40)="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", 0xfa}], 0xa, &(0x7f0000003500)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000001f140000e3ff0000000100007f0f000000", @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="3000000000ff12020000000000000069", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x150, 0x40}], 0x3, 0x44) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) r6 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r7, &(0x7f00000002c0), 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r7, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 20:56:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1356.453900][T21685] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1356.525433][T21690] bridge211: port 1(bond0) entered blocking state [ 1356.547429][T21690] bridge211: port 1(bond0) entered disabled state 20:56:04 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x6}}}}}}}}}, 0x0) [ 1356.588424][T21690] device bond0 entered promiscuous mode [ 1356.611926][T21690] device bond_slave_0 entered promiscuous mode 20:56:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) [ 1356.645799][T21690] device bond_slave_1 entered promiscuous mode [ 1356.676208][T21685] device bond0 left promiscuous mode [ 1356.684517][T21685] device bond_slave_0 left promiscuous mode [ 1356.717912][T21685] device bond_slave_1 left promiscuous mode [ 1356.749772][T21685] bridge211: port 1(bond0) entered disabled state [ 1356.790313][ T27] audit: type=1804 audit(1589144164.822:1763): pid=21696 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/905/cgroup.controllers" dev="sda1" ino=16371 res=1 20:56:04 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x7}}}}}}}}}, 0x0) 20:56:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x22, 0x2, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:05 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x8}}}}}}}}}, 0x0) 20:56:05 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x31}}}}}}}}}, 0x0) [ 1357.283413][ T27] audit: type=1804 audit(1589144165.312:1764): pid=21727 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1206/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 1357.608206][T21728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1357.634343][T21690] bridge211: port 1(bond0) entered blocking state [ 1357.647622][T21690] bridge211: port 1(bond0) entered disabled state [ 1357.682308][T21690] device bond0 entered promiscuous mode [ 1357.698640][T21690] device bond_slave_0 entered promiscuous mode [ 1357.705991][T21690] device bond_slave_1 entered promiscuous mode [ 1357.724525][T21731] device bond0 left promiscuous mode [ 1357.730340][T21731] device bond_slave_0 left promiscuous mode [ 1357.737721][T21731] device bond_slave_1 left promiscuous mode [ 1357.744257][T21731] bridge211: port 1(bond0) entered disabled state 20:56:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8106, r6}}, 0x20}}, 0x0) 20:56:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb1701ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b26235266ac8251a691582000000000daf09d24f3e6043e73cb48b11fdd9349f4b8ce0c24195241c66b8ac6e00d626ece5db50cd2148c18c40cd99110d32449baec68924fc336a9d646ca3005f580e9e6a6f3b7358dbd77e499b126ec7dd2e32ca3e88405af8cfdcd7b761a1d27f498d240d2420cbb852b00ced28b621554155e0e50f6657a2575973ec5dbbea3b29d2db1adc41047d3a9c22ce28159d21ff5ef3cd29147be382638a9e784321b00faa129900"/243], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000007678bcf0f79730dc1df84608ed81b7a676e736e6c8c5f6751542a010fbd622e8f8235c788efa76bbe2eba82b53299067"], 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x17, 0x2, [@TCF_META_TYPE_INT, @TCF_META_TYPE_VAR='p', @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_VAR="bb", @TCF_META_TYPE_INT, @TCF_META_TYPE_VAR="16"]}]}}]}]}]}}]}, 0x68}}, 0x0) 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x3d}}}}}}}}}, 0x0) 20:56:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:06 executing program 0: unshare(0x40000000) socket$inet6(0xa, 0x3, 0x3a) epoll_create(0x2) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000000), 0x3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 1358.045438][T21755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1358.091652][ T27] audit: type=1804 audit(1589144166.122:1765): pid=21756 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1207/cgroup.controllers" dev="sda1" ino=15890 res=1 [ 1358.107596][T21765] IPVS: ftp: loaded support on port[0] = 21 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x60}}}}}}}}}, 0x0) [ 1358.144358][T21755] bridge211: port 1(bond0) entered blocking state [ 1358.156005][T21755] bridge211: port 1(bond0) entered disabled state [ 1358.187992][T21755] device bond0 entered promiscuous mode [ 1358.208294][T21755] device bond_slave_0 entered promiscuous mode [ 1358.224209][T21755] device bond_slave_1 entered promiscuous mode 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x6d}}}}}}}}}, 0x0) [ 1358.241055][T21767] device bond0 left promiscuous mode [ 1358.250027][T21767] device bond_slave_0 left promiscuous mode [ 1358.268605][T21767] device bond_slave_1 left promiscuous mode [ 1358.297010][T21767] bridge211: port 1(bond0) entered disabled state 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0xff}}}}}}}}}, 0x0) 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x3}}}}}}}}}, 0x0) 20:56:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1358.631971][T21765] netdevsim0 speed is unknown, defaulting to 1000 [ 1359.095750][T21805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1359.114187][T21755] bridge211: port 1(bond0) entered blocking state [ 1359.121833][T21755] bridge211: port 1(bond0) entered disabled state [ 1359.146181][T21755] device bond0 entered promiscuous mode [ 1359.152169][T21755] device bond_slave_0 entered promiscuous mode [ 1359.159378][T21755] device bond_slave_1 entered promiscuous mode [ 1359.169898][T21806] device bond0 left promiscuous mode [ 1359.175208][T21806] device bond_slave_0 left promiscuous mode [ 1359.198564][T21806] device bond_slave_1 left promiscuous mode [ 1359.205194][T21806] bridge211: port 1(bond0) entered disabled state [ 1359.303981][ T27] audit: type=1804 audit(1589144167.332:1766): pid=21801 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1208/cgroup.controllers" dev="sda1" ino=15937 res=1 [ 1359.402564][T21770] IPVS: ftp: loaded support on port[0] = 21 20:56:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8107, r6}}, 0x20}}, 0x0) 20:56:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8105, r6}}, 0x20}}, 0x0) 20:56:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1359.452581][T21770] netdevsim0 speed is unknown, defaulting to 1000 20:56:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1359.537133][T21842] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1359.570705][ T21] tipc: TX() has been purged, node left! [ 1359.606572][T21846] bridge9: port 1(bond0) entered blocking state [ 1359.614381][T21846] bridge9: port 1(bond0) entered disabled state [ 1359.637421][T21846] device bond0 entered promiscuous mode [ 1359.651253][T21846] device bond_slave_0 entered promiscuous mode [ 1359.665527][T21846] device bond_slave_1 entered promiscuous mode [ 1359.682152][T21846] device bridge8 entered promiscuous mode [ 1359.697288][T21850] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1359.753941][T21842] device bond0 left promiscuous mode [ 1359.759607][T21842] device bond_slave_0 left promiscuous mode [ 1359.783425][T21842] device bond_slave_1 left promiscuous mode [ 1359.811566][T21842] device bridge8 left promiscuous mode [ 1359.833244][T21842] bridge9: port 1(bond0) entered disabled state [ 1359.968694][T21852] bridge211: port 1(bond0) entered blocking state [ 1359.975567][T21852] bridge211: port 1(bond0) entered disabled state [ 1359.999681][T21852] device bond0 entered promiscuous mode [ 1360.031231][T21852] device bond_slave_0 entered promiscuous mode [ 1360.056249][T21852] device bond_slave_1 entered promiscuous mode [ 1360.069113][T21856] device bond0 left promiscuous mode [ 1360.079568][T21856] device bond_slave_0 left promiscuous mode [ 1360.107657][T21856] device bond_slave_1 left promiscuous mode [ 1360.135624][T21856] bridge211: port 1(bond0) entered disabled state [ 1360.174460][ T27] audit: type=1804 audit(1589144168.202:1767): pid=21853 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1209/cgroup.controllers" dev="sda1" ino=15740 res=1 [ 1360.541321][T21852] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:08 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 20:56:08 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd606226e000140600000000000000000000000000020000002001000000000000000000000000000200000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500090784000"], 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x17, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_FLOWTABLE_HOOK={0x7c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_team\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'gretap0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8001}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x119}, 0x20008044) 20:56:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8109, r6}}, 0x20}}, 0x0) 20:56:08 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x94}}, 0xc) r5 = socket$inet(0x2, 0x3, 0x2) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFNL_MSG_ACCT_NEW(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x7, 0x801, 0x0, 0x0, {0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4048000) setsockopt$inet_mreqsrc(r5, 0x0, 0x40, &(0x7f0000000140)={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102}, 0xc) r7 = socket$inet(0x2, 0x3, 0x2) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000052c0)=0x0, &(0x7f0000005300)=0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005480)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000002c0)="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", 0x1000}], 0x1, &(0x7f0000002600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe0d}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_retopts={{0x30, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x0, 0x4d, 0x3, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@rand_addr=0x64010101, 0x8001}, {@rand_addr=0x64010102, 0x2}, {@local, 0x7f}, {@multicast2, 0x31}]}, @generic={0x89, 0x11, "eb1f27a3612a50be39ae0522ed76f0"}, @generic={0x59, 0xd, "4d20fd9b3e616c559d57b8"}]}}}], 0x80}}, {{&(0x7f0000001380)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000026c0)=[{&(0x7f00000013c0)="10148eae67f1e52c720be756b9d27ee39684af30ebb113247e94526f", 0x1c}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="3a61083c24b22a8b3e30d736b5570355e99a57a49e10e271b6b44e8bc73063bbc6574a5b870d655907480336f4822e066d0a87ad8bfd809886ebb54876eaf8c741787eacfca1daa9966e9dfd6d7f", 0x4e}, {&(0x7f0000002480)="ae68bca9e3fed64e1b5a7cadb8eb5018b7df4e3c8255615e1533a41a2a767e99f4445e95f844b1d6b521fcc37dd83bb4d9f03e1de27a14f6", 0x38}, {&(0x7f00000024c0)="b1e1b798358028ea2a60a2fcda7fb3cdde1fc935a92330a61f6e08224223e5ffd2f8cde7c22229e13c80393c043f920ee34bb17c75", 0x35}, {&(0x7f0000002500)="e47f1dba994a9da313b013a27f6e0023e659665083fa37f6cbcf7a0b70bd4a2080da705c335d9b59cfe0870149c8e11f84ddb42df0fb8e256a4f9ee95778231a02ac1e4e32e92f6dd8b119d6863af335810f700150f7ce8c2cbdf28a7c4438ce63a057e46cd6c621f016e8648fb41b912bd883c97ede88a92113a10c467f7ed658d427faaf28f1a05b82e59e1dc709ca057f3bd5c59248ba7553f9d2b43eba25051fc3cd95cb2fb966762fabfe4a493bd6c7315da7843bab6bd6c6c118d45c8d2f55d85da98560ef5e460f24227d", 0xce}, {&(0x7f0000004f40)="a1d6fd5990490581fc92703285c348156fd94d0756d408b61c0f0264e00000519d8119ad880983b66a2b4dbf48bda090b5bfccbbd877e404bd55b2e0825c16103e168d9c77ee24d02d0e5f976d31b5b2c3beeb568f29f690ac34bef3b2356cdaf35b5d29178bc1fdb4932e8a78f60c638b55aea24a16f83b745a0cd50a73bb58235a1a00d2241c8fb0df446e223cfbd678eec19de082be1e107b110512e3ca6ee1e616316bb080b02d62462d903c5b3044534003d1eb06e8b8c9c2765e96e073e48c5e91e0428beae91ff31af21950aab63318b6056720d7c0b402948b3c5b612c14667d5de35623d2df5a30", 0xec}], 0x7, &(0x7f0000002740)=[@ip_retopts={{0x44, 0x0, 0x7, {[@timestamp={0x44, 0x0, 0x8, 0x0, 0xd, [0x724a, 0xfffffff9, 0x2, 0x0, 0x49, 0x400, 0x5, 0x7]}]}}}], 0x48}}, {{&(0x7f00000027c0)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000003900)=[{&(0x7f0000002800)="8db684290aca1f9a426c2b1345276862d382c1a26d28ba432ebf7aa6fedf2ee02d24ae2de9c44104a75298d5669581ddd43b61ddf9098c43dfe2f12df4793b4e46f0f74535ad6f4cba576e029448b1697fa2ddb58b384d2637cca3c715f45851dac6542b10d9aeebdef11468c77c369e726fa0601e9050cef2000fcd99deb8c0df0e878b90400ce0a6a47777cb950049d9963e5bf186eeb5d1008b9ebe7a8b2b962bc8dc725945d7441a807f39d1345f2ebfd4c12fb474d2c1dfa1882a83cca0074ffe9628565af35b853ded315b70d429f4bb04032528a6da46f98dcdfe504806470ed22ec1a91edad0aacc04a0172e54dc42d0a623b2", 0xf7}, {&(0x7f0000002900)="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", 0x1000}], 0x2, &(0x7f0000003940)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_ttl={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @local}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x33}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0xc8}}, {{0x0, 0x53, &(0x7f0000004b40)=[{&(0x7f0000003a40)="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", 0xfa}, {&(0x7f0000003b40)="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", 0x1000}], 0x2}}, {{&(0x7f0000004b80)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000004ec0)=[{&(0x7f0000004bc0)="8a268d27ddab3ac815b09a0fcc57f207ef8f7522a3c340a0036ac166f92c4487f8033183497ef4cd524e1e2027d1ff6f85857a167145f39a54076c5881446328fb71b31626deb805bf056f2284109595597bd31661d567a37cbeea059d6cd986d735a194b1ca550fa2b2fdd093d73369a6d7dbbb6b2a5fb898ac9d8c9f3b7255681cc66f4cfe5fb0c7ed345692f70e3951f73fc107205119030eba05e0aaba7fd0555ec9ad9a8e96532a8e1e565916", 0xaf}, {&(0x7f0000004c80)="fde33af51e52645071928e126bacfdac94ea00", 0x13}, {&(0x7f0000004cc0)="22d5e489228b7a44cf1d169bef77ab99be094878d15cb3ad3b371d14afa0f9b0ee91ebaf1c3b6df737cb519478791eab44c281117ed918726b1d8832cdd49bff9e627f9605c0ea54fd61ea0f68a5767a34ba3d5c0f5fcd03b2dfe2e2c79eba733314cd3d8447af99f34a109a61e56fe1a70f6cae3f474863f5399f9e63430edbefb80c965aaea30ed8", 0x89}, {&(0x7f0000004d80)="3692558c59da53621a8dd5911c037856084d17fb19b5c2737790220eeae42636464f955451a3847c73f18ed1eebd8650b2b2e56577bf17ce04f08728dc35a0ff05dff758c4f21bb25347c33f272e237a0a5caa1915d76cad6d68d895cc1ea84e2607c5ed3b62a249f7da2c112860317fc19a76127740c2eec76c07a2cd72d4cc00b15a7b3afd66a515b9ea10a0302bd5974ff1c4dbf14e12801d4f608e04a0e472fcc99abe76e9e83457e5e589b8c70f3e59cda0ebcd5f70df597fc94642a2c5eb040482ab1f8fc1fc6e141b3d0c8237c1a719b1f0af56242e05020925981511008382206e80b657a9d906a5d6", 0xed}, {&(0x7f0000004e80)}], 0x5, &(0x7f0000005340)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x400}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5d, 0x0, 0x6, [0x5]}, @end, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast1, @rand_addr=0x64010101}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2100}}, @ip_retopts={{0x50, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0xc8, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@broadcast, 0x7}]}, @cipso={0x86, 0x2b, 0x3, [{0x7, 0x6, "eb24b389"}, {0x2, 0xe, "6b0128f2c8bdbdee4e2acb3f"}, {0x0, 0x11, "4ee1f1570ff33b8516eda848647c78"}]}]}}}], 0x108}}], 0x5, 0x0) setsockopt$inet_mreqsrc(r7, 0x0, 0x40, &(0x7f0000000140)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) splice(r5, &(0x7f0000000000)=0x3, r7, &(0x7f0000000100)=0x8, 0x9, 0xa) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYRESOCT=r3, @ANYRES32=0x0, @ANYRESDEC=r4], 0x3}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 20:56:08 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xfffffff1, 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) [ 1360.721635][T21909] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:08 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1360.802071][T21914] bridge212: port 1(bond0) entered blocking state [ 1360.818500][T21914] bridge212: port 1(bond0) entered disabled state [ 1360.857654][T21914] device bond0 entered promiscuous mode [ 1360.881370][T21914] device bond_slave_0 entered promiscuous mode 20:56:08 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x581, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan1\x00'}]}]}, 0x38}}, 0x0) [ 1360.910473][T21914] device bond_slave_1 entered promiscuous mode 20:56:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) [ 1360.963366][T21909] device bond0 left promiscuous mode [ 1360.971567][T21909] device bond_slave_0 left promiscuous mode [ 1360.988195][T21909] device bond_slave_1 left promiscuous mode [ 1361.001708][T21909] bridge212: port 1(bond0) entered disabled state 20:56:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$tipc(0x0) socket(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x30, r5, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0xfffffff0}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r6, 0x0, 0x100000001) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, 0x1, 0x9, 0x101, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x401}]}, 0x30}, 0x1, 0x0, 0x0, 0x882}, 0x4008000) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1361.397648][ T27] audit: type=1804 audit(1589144169.432:1768): pid=21950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/911/cgroup.controllers" dev="sda1" ino=16096 res=1 20:56:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) [ 1361.533122][ T27] audit: type=1804 audit(1589144169.562:1769): pid=21917 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1210/cgroup.controllers" dev="sda1" ino=16050 res=1 20:56:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x400) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xffda, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK_NETNSID]}, 0x48}}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 1361.613950][ T27] audit: type=1804 audit(1589144169.642:1770): pid=21960 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/911/cgroup.controllers" dev="sda1" ino=16096 res=1 [ 1361.762589][T21964] IPVS: ftp: loaded support on port[0] = 21 [ 1361.813377][T21957] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1361.882900][T21914] bridge212: port 1(bond0) entered blocking state [ 1361.896013][T21914] bridge212: port 1(bond0) entered disabled state [ 1361.903881][T21914] device bond0 entered promiscuous mode [ 1361.986454][T21914] device bond_slave_0 entered promiscuous mode [ 1361.993121][T21914] device bond_slave_1 entered promiscuous mode [ 1362.080425][T21958] device bond0 left promiscuous mode [ 1362.086102][T21958] device bond_slave_0 left promiscuous mode [ 1362.092676][T21958] device bond_slave_1 left promiscuous mode [ 1362.110082][T21958] bridge212: port 1(bond0) entered disabled state [ 1362.312760][T21965] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.332046][T21965] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1362.409866][T21964] netdevsim0 speed is unknown, defaulting to 1000 20:56:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x810a, r6}}, 0x20}}, 0x0) 20:56:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 20:56:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1362.541323][T21965] IPVS: ftp: loaded support on port[0] = 21 [ 1362.556201][T21995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) 20:56:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1362.639711][T22000] bridge212: port 1(bond0) entered blocking state [ 1362.676448][T22000] bridge212: port 1(bond0) entered disabled state 20:56:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1362.722115][T22000] device bond0 entered promiscuous mode [ 1362.752453][T22000] device bond_slave_0 entered promiscuous mode 20:56:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 20:56:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1362.792148][T22000] device bond_slave_1 entered promiscuous mode [ 1362.858662][T22005] device bond0 left promiscuous mode [ 1362.866724][T22005] device bond_slave_0 left promiscuous mode [ 1362.896888][T22005] device bond_slave_1 left promiscuous mode 20:56:11 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1362.928546][T22005] bridge212: port 1(bond0) entered disabled state [ 1363.017635][ T27] audit: type=1804 audit(1589144171.053:1771): pid=22020 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1214/cgroup.controllers" dev="sda1" ino=16107 res=1 20:56:11 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 20:56:11 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) [ 1363.571656][T21965] netdevsim0 speed is unknown, defaulting to 1000 [ 1363.598381][T22000] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:14 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) 20:56:14 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 20:56:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x810c, r6}}, 0x20}}, 0x0) 20:56:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000090000000c0003800800010001"], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000ec00100000000c0001"], 0x20}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x24c, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x108, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2358aad9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7524ab47}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3600e775}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18b28a9e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a28d638}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2d67b433}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x510977d9}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xce34}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b1ce0da}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf0}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76e65563}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31ee581d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2460a69a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7826e2ba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3534d98e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b9c5578}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x299c7820}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1a6e9ca5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10c, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2df2091}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b5e69a4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa4460b6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1154c071}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55f6f89}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60b6992d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1e213591}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x120d028b}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x37bda7d4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28f03977}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x63e77cba}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x16}]}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r1, 0x0, 0x100000001) 20:56:14 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000002) [ 1366.697165][ T21] tipc: TX() has been purged, node left! [ 1366.703341][ T21] tipc: TX() has been purged, node left! [ 1366.709160][T22097] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:14 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) [ 1366.784028][T22106] bridge213: port 1(bond0) entered blocking state [ 1366.791824][T22106] bridge213: port 1(bond0) entered disabled state [ 1366.809196][ T27] audit: type=1804 audit(1589144174.843:1772): pid=22100 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/912/cgroup.controllers" dev="sda1" ino=16121 res=1 [ 1366.827335][T22106] device bond0 entered promiscuous mode 20:56:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1366.877959][T22106] device bond_slave_0 entered promiscuous mode [ 1366.911546][T22106] device bond_slave_1 entered promiscuous mode [ 1366.935186][ T27] audit: type=1804 audit(1589144174.963:1773): pid=22105 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1385/cgroup.controllers" dev="sda1" ino=16125 res=1 20:56:15 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 20:56:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:15 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 20:56:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x40eae, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000911d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffdd, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, 0x1c) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x3f8, 0x260, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x328, 0xffffffff, 0xffffffff, 0x328, 0xffffffff, 0x3, &(0x7f0000000140), {[{{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @local, [0xffffffff, 0x7fffff7f, 0xff000000], [0xffffff00, 0xffffffff, 0xff000000, 0xff000000], 'wg0\x00', 'batadv_slave_1\x00', {}, {0xff}, 0x87, 0xbd, 0x2, 0x40}, 0x0, 0x138, 0x260, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x67, 0x2, 0x7f, 0xdf, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, @loopback, [0xff000000, 0xff, 0xffffffff, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff000000], [0xff000000, 0xff000000, 0xffffff00, 0xff], 0x22, 0x123}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x8986, 'system_u:object_r:devicekit_disk_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe84790") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, 0x25, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r4}, @typed={0x8, 0x82, 0x0, 0x0, @pid=r6}]}, 0x24}, 0x1, 0xffffff7f0e000000}, 0x0) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x4, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}}, 0xc) r8 = accept(r7, &(0x7f0000000240)=@isdn, &(0x7f00000001c0)=0x80) sendmsg$IPSET_CMD_TYPE(r8, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000940)={&(0x7f00000007c0)={0x1c, 0xd, 0x6, 0x0, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000880}, 0x20000010) close(r0) 20:56:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:15 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31}}}}}}}}}, 0x0) [ 1367.428138][T22135] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 1367.523913][T22145] x_tables: duplicate underflow at hook 3 [ 1367.587830][T22111] device bond0 left promiscuous mode [ 1367.593291][T22111] device bond_slave_0 left promiscuous mode [ 1367.600811][T22111] device bond_slave_1 left promiscuous mode [ 1367.608449][T22111] bridge213: port 1(bond0) entered disabled state [ 1367.767458][T22137] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1367.809256][T22097] bridge213: port 1(bond0) entered blocking state [ 1367.817456][T22097] bridge213: port 1(bond0) entered disabled state [ 1367.834254][T22097] device bond0 entered promiscuous mode [ 1367.853918][T22097] device bond_slave_0 entered promiscuous mode [ 1367.867518][T22097] device bond_slave_1 entered promiscuous mode [ 1367.877390][T22106] device bond0 left promiscuous mode [ 1367.882700][T22106] device bond_slave_0 left promiscuous mode [ 1367.889919][T22106] device bond_slave_1 left promiscuous mode [ 1367.897476][T22106] bridge213: port 1(bond0) entered disabled state 20:56:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x810e, r6}}, 0x20}}, 0x0) 20:56:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:16 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d}}}}}}}}}, 0x0) 20:56:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r4, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000002c0)={r4, 0x401, 0x1, "b9"}, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d42269fa4e00000000e9000500010007"], 0x1}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r5, 0x0, 0x100000001) r7 = accept(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x80) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000280)=ANY=[@ANYBLOB="46040000", @ANYRES16=r8, @ANYBLOB="ff830a00000016000a00", @ANYRES64=r6], 0x4}, 0x1, 0x0, 0x0, 0x4004800}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r7, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r8, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c850}, 0x0) [ 1368.250567][T22135] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 20:56:16 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}}}}}, 0x0) 20:56:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1368.318937][T22145] x_tables: duplicate underflow at hook 3 [ 1368.329475][ T27] audit: type=1804 audit(1589144176.363:1774): pid=22186 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/913/cgroup.controllers" dev="sda1" ino=16133 res=1 [ 1368.357693][T22193] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1368.417397][T22205] bridge213: port 1(bond0) entered blocking state [ 1368.429606][T22205] bridge213: port 1(bond0) entered disabled state [ 1368.454702][T22205] device bond0 entered promiscuous mode 20:56:16 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d}}}}}}}}}, 0x0) [ 1368.467668][T22205] device bond_slave_0 entered promiscuous mode [ 1368.487073][T22205] device bond_slave_1 entered promiscuous mode 20:56:16 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}}}}}}}}, 0x0) [ 1368.534100][T22193] device bond0 left promiscuous mode [ 1368.539700][T22193] device bond_slave_0 left promiscuous mode [ 1368.574550][T22193] device bond_slave_1 left promiscuous mode [ 1368.642571][T22193] bridge213: port 1(bond0) entered disabled state [ 1369.070763][T22205] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, r2, 0x0, 0xf03b0000) r3 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x60) write$binfmt_script(r3, &(0x7f0000000280)=ANY=[], 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e2c, 0x0, @ipv4={[], [], @local}}, 0x1c) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r5, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) tee(0xffffffffffffffff, r5, 0x3, 0x8) sendmmsg(r4, &(0x7f00000092c0), 0x0, 0x200000000000000) sendfile(r4, r0, 0x0, 0x8000000000004) shutdown(0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x4040840) recvmmsg(0xffffffffffffffff, &(0x7f0000003480), 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x6, 0xffffff00}, 0xc) 20:56:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc282841ac14140ee3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000040)={r7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000180)={r7, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r7, 0x2}, &(0x7f0000000080)=0xc) 20:56:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:17 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x3}}}}}}}}, 0x0) 20:56:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8110, r6}}, 0x20}}, 0x0) 20:56:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1369.323263][T22261] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:17 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x0) [ 1369.392757][T22266] bridge214: port 1(bond0) entered blocking state [ 1369.419553][T22266] bridge214: port 1(bond0) entered disabled state [ 1369.478413][T22266] device bond0 entered promiscuous mode 20:56:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:17 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x5}}}}}}}}, 0x0) [ 1369.525455][T22266] device bond_slave_0 entered promiscuous mode [ 1369.531832][T22266] device bond_slave_1 entered promiscuous mode 20:56:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:17 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x6}}}}}}}}, 0x0) [ 1370.054223][T22261] device bond0 left promiscuous mode [ 1370.059925][T22261] device bond_slave_0 left promiscuous mode [ 1370.085674][T22261] device bond_slave_1 left promiscuous mode [ 1370.092143][T22261] bridge214: port 1(bond0) entered disabled state 20:56:18 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x8}}}}}}}}, 0x0) 20:56:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0xaa20) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000340)={{0x6, @local, 0x4e21, 0x0, 'lc\x00', 0x1f, 0x10000, 0x2b}, {@local, 0x4e24, 0x4, 0x2, 0xf9ae, 0x4}}, 0x44) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400)=0xfff, 0x4) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='rdma.current\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x37e7, 0x24ba1dc0}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0xfffffd37) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000ea316d6fe0a2338b7ad458892aed02d2165b35827baee84aae61ac6396082777dd91b631d0627f6eaefef1098fb953971f24af", @ANYRES16=r5, @ANYBLOB="000125bd7000fcdbdf25000000000500220001000000"], 0x3}, 0x1, 0x0, 0x0, 0x20004041}, 0x4000008) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) close(r2) 20:56:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000100), &(0x7f0000000240)=0x4) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000280)={0xffffffffffffffff, 0x0, "377318", 0x81, 0x6}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000001868000d6fa92343eb2198f8c027ccefbef5b5180b70e160e86513a29408a38e7d7159835389e4b6cf009b028e29c4b04f1e278517a1b49a141f517d4bb8a7b29e317a7d201dd4895858121223275c376cfeddcfc"], 0x48}}, 0x0) socket$rxrpc(0x21, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="240000001800dd8d13840a5d40000000020010002000fe020000000008000400", @ANYRES32=r3, @ANYBLOB], 0x24}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 1370.252622][T22294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1370.331746][T22266] bridge214: port 1(bond0) entered blocking state [ 1370.346804][T22266] bridge214: port 1(bond0) entered disabled state [ 1370.380731][T22266] device bond0 entered promiscuous mode [ 1370.406805][T22266] device bond_slave_0 entered promiscuous mode [ 1370.439968][T22266] device bond_slave_1 entered promiscuous mode [ 1370.472481][T22297] device bond0 left promiscuous mode [ 1370.481246][T22297] device bond_slave_0 left promiscuous mode [ 1370.505759][T22297] device bond_slave_1 left promiscuous mode [ 1370.527472][T22297] bridge214: port 1(bond0) entered disabled state 20:56:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8148, r6}}, 0x20}}, 0x0) [ 1370.958620][T22335] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1370.981352][T22336] bridge214: port 1(bond0) entered blocking state [ 1370.988099][T22336] bridge214: port 1(bond0) entered disabled state [ 1370.996978][T22336] device bond0 entered promiscuous mode [ 1371.002725][T22336] device bond_slave_0 entered promiscuous mode [ 1371.010667][T22336] device bond_slave_1 entered promiscuous mode [ 1371.023614][T22337] device bond0 left promiscuous mode [ 1371.029417][T22337] device bond_slave_0 left promiscuous mode [ 1371.035765][T22337] device bond_slave_1 left promiscuous mode [ 1371.042275][T22337] bridge214: port 1(bond0) entered disabled state 20:56:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x9}}}}}}}}, 0x0) 20:56:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:19 executing program 0: r0 = socket$inet(0x2, 0x1, 0xaa20) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000340)={{0x6, @local, 0x4e21, 0x0, 'lc\x00', 0x1f, 0x10000, 0x2b}, {@local, 0x4e24, 0x4, 0x2, 0xf9ae, 0x4}}, 0x44) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400)=0xfff, 0x4) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='rdma.current\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x37e7, 0x24ba1dc0}) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0xfffffd37) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000ea316d6fe0a2338b7ad458892aed02d2165b35827baee84aae61ac6396082777dd91b631d0627f6eaefef1098fb953971f24af", @ANYRES16=r5, @ANYBLOB="000125bd7000fcdbdf25000000000500220001000000"], 0x3}, 0x1, 0x0, 0x0, 0x20004041}, 0x4000008) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) close(r2) [ 1371.275919][T22336] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x10}}}}}}}}, 0x0) 20:56:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x814c, r6}}, 0x20}}, 0x0) [ 1371.399552][ T27] audit: type=1804 audit(1589144179.433:1775): pid=22361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1228/cgroup.controllers" dev="sda1" ino=16125 res=1 20:56:19 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000040)=0x7, 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x12, &(0x7f00000000c0)=[{&(0x7f0000000300)="d800000018008105e00f80ecdb4cb9040a1d65ef0b027c05e8fe55a10a000400ac14142603000e1208001e000000812f0300040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 20:56:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x3fffffff}}}}}}}}, 0x0) 20:56:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3}}}}}}}}}, 0x0) [ 1372.200112][T22368] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1372.211876][T22368] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1372.241951][T22370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1372.303509][T22375] bridge215: port 1(bond0) entered blocking state [ 1372.313804][T22375] bridge215: port 1(bond0) entered disabled state [ 1372.331538][T22375] device bond0 entered promiscuous mode [ 1372.342719][T22375] device bond_slave_0 entered promiscuous mode [ 1372.364512][T22375] device bond_slave_1 entered promiscuous mode [ 1372.382015][T22376] device bond0 left promiscuous mode [ 1372.390452][T22376] device bond_slave_0 left promiscuous mode [ 1372.391830][ T27] audit: type=1804 audit(1589144180.423:1776): pid=22386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1230/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1372.398749][T22376] device bond_slave_1 left promiscuous mode [ 1372.434505][T22376] bridge215: port 1(bond0) entered disabled state [ 1372.557732][T22392] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1372.569503][T22392] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1372.594346][T22370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1372.634363][T22375] bridge215: port 1(bond0) entered blocking state [ 1372.643397][T22375] bridge215: port 1(bond0) entered disabled state [ 1372.657161][T22375] device bond0 entered promiscuous mode [ 1372.662845][T22375] device bond_slave_0 entered promiscuous mode [ 1372.671996][T22375] device bond_slave_1 entered promiscuous mode [ 1372.681986][T22396] device bond0 left promiscuous mode [ 1372.687950][T22396] device bond_slave_0 left promiscuous mode [ 1372.694566][T22396] device bond_slave_1 left promiscuous mode [ 1372.701995][T22396] bridge215: port 1(bond0) entered disabled state 20:56:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r3 = socket(0x10, 0x803, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="64010100e000e9090100000007ecffffab1e001414aae00700020a010102ac1414bbac1414bb"], 0x2c) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="e371a01c7d83e16db1918b5328546fd0db633ad73f48121530e272e1e1c5c2d65138cf6e0000624400000000000000"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x28, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$RDMA_NLDEV_CMD_DELLINK(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x18, 0x1404, 0x100, 0x70bd29, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x20044810}, 0x40000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r5, 0xfffffffb, 0x14}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r4, @ANYBLOB="003be04e068035"], 0x20}}, 0x0) 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x5}}}}}}}}}, 0x0) 20:56:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a926042512e17e46f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbe24ec88317"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff0a0a4000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390103051a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = accept4(r1, &(0x7f0000000280)=@xdp, &(0x7f00000001c0)=0x80, 0x800) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000380)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x0, 0x71}, 0xc) 20:56:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8160, r6}}, 0x20}}, 0x0) [ 1373.157558][T22417] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6}}}}}}}}}, 0x0) [ 1373.238271][T22421] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1373.312485][T22424] bridge215: port 1(bond0) entered blocking state [ 1373.330116][T22424] bridge215: port 1(bond0) entered disabled state 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x7}}}}}}}}}, 0x0) [ 1373.372650][T22424] device bond0 entered promiscuous mode [ 1373.394605][T22424] device bond_slave_0 entered promiscuous mode [ 1373.426562][T22424] device bond_slave_1 entered promiscuous mode 20:56:21 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'hsr0\x00', r4}) socket(0x0, 0x0, 0x0) unshare(0x40000000) socket$can_bcm(0x1d, 0x2, 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x8}}}}}}}}}, 0x0) [ 1373.468632][T22425] batman_adv: batadv0: Adding interface: veth79 [ 1373.480354][T22425] batman_adv: batadv0: The MTU of interface veth79 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1373.588331][T22425] batman_adv: batadv0: Not using interface veth79 (retrying later): interface not active [ 1373.614689][T22417] device bond0 left promiscuous mode [ 1373.622910][T22417] device bond_slave_0 left promiscuous mode [ 1373.655421][T22417] device bond_slave_1 left promiscuous mode [ 1373.679191][T22417] bridge215: port 1(bond0) entered disabled state 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x31}}}}}}}}}, 0x0) [ 1373.704097][T22453] IPVS: ftp: loaded support on port[0] = 21 20:56:21 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3d}}}}}}}}}, 0x0) [ 1373.838590][T22421] batman_adv: batadv0: Removing interface: veth79 [ 1373.897116][T22450] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1373.945116][ T27] audit: type=1804 audit(1589144181.973:1777): pid=22426 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1231/cgroup.controllers" dev="sda1" ino=16355 res=1 [ 1374.280475][T22471] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1374.308855][T22425] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1374.340761][T22453] netdevsim0 speed is unknown, defaulting to 1000 [ 1374.348315][T22430] batman_adv: batadv0: Adding interface: veth79 [ 1374.354590][T22430] batman_adv: batadv0: The MTU of interface veth79 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1374.414964][T22430] batman_adv: batadv0: Not using interface veth79 (retrying later): interface not active [ 1374.436617][T22450] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:56:22 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x60}}}}}}}}}, 0x0) 20:56:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8168, r6}}, 0x20}}, 0x0) 20:56:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:22 executing program 0: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x2000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="726177b9f70000000000000000000000000000000000000000000000000000000200000003000000880400000000000098000000000000009800000500000000f0030000f0030000f0030000f0030000f00300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000010000070000000000ac1414aa00000000000000000000000076657468315f746f5f626f6e6400000065716c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001003580300000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000269705f7674693000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000fcffffff0e0000600000000000000000000000005001686173686c696d697400000001000000000000000000000000000000000276657468305f746f5f7b737200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000006e00000000000000000000000900000008000000000000000000000000000000480054454500000000000000000000ba60eabc545ffd22000000000000000001ac1414bb0000000000000000000000007465716c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c40)=@filter={'filter\x00', 0xe, 0x3, 0x5d2, [0x0, 0x20000640, 0x200007de, 0x2000080e], 0x0, &(0x7f0000000540), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x11, 0x10, 0x80f3, 'veth0_to_hsr\x00', 'veth0_vlan\x00', 'macsec0\x00', 'netpci0\x00', @local, [0xff, 0x0, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0x0, 0xff], 0xee, 0x136, 0x16e, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0xf, 0xf60, 0x80, 0x7ff, 0x40}}}, @statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x0, 0x8001, 0x7fff, 0x0, {0x9bbe}}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"3463d257ac23b7dc9b257840858be284947ad55ff29fb52df00d22858030"}}], @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{0x9, 0x30, 0xf7, 'wg0\x00', 'macvtap0\x00', 'ipvlan0\x00', 'erspan0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe6, 0xe6, 0x116, [@mac={{'mac\x00', 0x0, 0x10}, {{@broadcast}}}, @quota={{'quota\x00', 0x0, 0x18}, {{0x0, 0x0, 0x1, {0x6}}}}], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}, {0x5, 0x40, 0x88a2, 'ip6tnl0\x00', 'ipvlan0\x00', 'vlan0\x00', 'ip6erspan0\x00', @multicast, [0xff, 0x0, 0x101, 0x0, 0xff], @local, [0xff, 0x0, 0xff, 0xff, 0xff], 0x6e, 0x216, 0x28e, [], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x49, 0xac9, 0x100, 0x1, 0x0, "7df157038d39fcef673ee620b62b94f54a63d79e0ecb218c7e75a437299e5fde2e35b87c5279429c663c65fa553229f122d36ab6a4754cc0c8ca1c5200490c0e"}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x10001, 'system_u:object_r:netutils_exec_t:s0\x00'}}}], @common=@nflog={'nflog\x00', 0x50, {{0x3, 0x5, 0xfe01, 0x0, 0x0, "11e4d89119961e5c3785835f9197e84a214f6cdc6c61036cd4654a2bd7f201658529c030a563a7f08ad2d114bf865d36085feb3eca325ced38023ddf9825027b"}}}}]}, {0x0, '\x00', 0x3, 0x3}]}, 0x64a) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x2000000000000, 0x40, &(0x7f0000000000)=ANY=[], 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc}]}}}]}, 0x40}}, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r6, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) bind(r3, &(0x7f00000005c0)=@xdp={0x2c, 0xa, r6, 0xf}, 0x80) 20:56:23 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6d}}}}}}}}}, 0x0) [ 1374.978355][T22522] bridge216: port 1(bond0) entered blocking state [ 1375.007866][T22522] bridge216: port 1(bond0) entered disabled state [ 1375.028927][T22522] device bond0 entered promiscuous mode [ 1375.048127][T22522] device bond_slave_0 entered promiscuous mode [ 1375.077043][T22522] device bond_slave_1 entered promiscuous mode 20:56:23 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x300}}}}}}}}}, 0x0) [ 1375.130698][T22533] device bond0 left promiscuous mode [ 1375.136852][T22533] device bond_slave_0 left promiscuous mode [ 1375.165350][T22533] device bond_slave_1 left promiscuous mode [ 1375.201523][T22533] bridge216: port 1(bond0) entered disabled state 20:56:23 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3e8}}}}}}}}}, 0x0) [ 1375.733728][ T27] audit: type=1804 audit(1589144183.764:1778): pid=22532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1232/cgroup.controllers" dev="sda1" ino=16339 res=1 [ 1375.862020][T22522] bridge216: port 1(bond0) entered blocking state [ 1375.878914][T22522] bridge216: port 1(bond0) entered disabled state [ 1375.897551][T22522] device bond0 entered promiscuous mode [ 1375.911304][T22522] device bond_slave_0 entered promiscuous mode [ 1375.925979][T22522] device bond_slave_1 entered promiscuous mode [ 1375.954706][T22569] device bond0 left promiscuous mode [ 1375.966056][T22569] device bond_slave_0 left promiscuous mode [ 1375.984538][T22569] device bond_slave_1 left promiscuous mode [ 1376.006833][T22569] bridge216: port 1(bond0) entered disabled state 20:56:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000240)=@netrom={'nr', 0x0}, 0x10) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05", @ANYRES32=0x0], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="0d0f2d10e9445352186fba31b7a7347da9248f6e192777a9df9e791edc5f377dcc3ba0ee33bec76f74ae02ac9fa4da42808040936bf7aeaafde7ed60a80e244c5676a4c21592d03e7fcb2f8f1cadee5072ded6464bbc7b34aa94b2e0f4b42a937ee94d8e8a4afe2dc1f886d5c44310aa5f526d6725d3140000"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x28}}, 0x800) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x800) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, 0x0, 0x8006) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:56:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x500}}}}}}}}}, 0x0) 20:56:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/285], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028be168a90a49427d28a3924a549219669e49a51000900000000", @ANYRES32=0x0, @ANYBLOB='\x00'], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x28001}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}]}, 0x2c}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r6, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r7}, 0x30) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000240)={0x5, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}]}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3400000000545e483931c958b092ab100001084000"/31, @ANYRES32=r5, @ANYBLOB="013000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) 20:56:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x816c, r6}}, 0x20}}, 0x0) [ 1377.307500][T22588] __nla_validate_parse: 4 callbacks suppressed [ 1377.307510][T22588] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1377.341982][ T21] tipc: TX() has been purged, node left! 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x600}}}}}}}}}, 0x0) [ 1377.383289][ T27] audit: type=1804 audit(1589144185.414:1779): pid=22594 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/919/cgroup.controllers" dev="sda1" ino=16204 res=1 [ 1377.427028][T22597] bridge216: port 1(bond0) entered blocking state [ 1377.440628][T22597] bridge216: port 1(bond0) entered disabled state [ 1377.468060][T22597] device bond0 entered promiscuous mode [ 1377.491093][T22597] device bond_slave_0 entered promiscuous mode [ 1377.509873][T22597] device bond_slave_1 entered promiscuous mode 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x700}}}}}}}}}, 0x0) [ 1377.524138][T22592] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1377.541587][T22601] device bond0 left promiscuous mode [ 1377.552455][T22601] device bond_slave_0 left promiscuous mode [ 1377.569343][T22601] device bond_slave_1 left promiscuous mode [ 1377.579965][T22601] bridge216: port 1(bond0) entered disabled state 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3100}}}}}}}}}, 0x0) 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3d00}}}}}}}}}, 0x0) 20:56:25 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3f00}}}}}}}}}, 0x0) [ 1377.863673][ T27] audit: type=1804 audit(1589144185.894:1780): pid=22598 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1233/cgroup.controllers" dev="sda1" ino=16201 res=1 20:56:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1378.073954][T22594] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1378.119242][T22600] batman_adv: batadv0: Adding interface: veth101 [ 1378.134733][T22600] batman_adv: batadv0: The MTU of interface veth101 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1378.194698][T22600] batman_adv: batadv0: Not using interface veth101 (retrying later): interface not active [ 1378.230186][T22610] batman_adv: batadv0: Removing interface: veth101 [ 1378.286741][T22608] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1378.305708][T22597] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:26 executing program 1: unshare(0x40000000) mmap(&(0x7f00000f7000/0x1000)=nil, 0x1000, 0x3, 0x80010, 0xffffffffffffffff, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000080)={0x7, 'dummy0\x00', {0x1}, 0x8dfb}) 20:56:26 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x4000}}}}}}}}}, 0x0) 20:56:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, 0x0, 0x0) 20:56:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8174, r6}}, 0x20}}, 0x0) 20:56:26 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6000}}}}}}}}}, 0x0) [ 1378.547698][T22655] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1378.609743][T22663] bridge217: port 1(bond0) entered blocking state [ 1378.642486][T22663] bridge217: port 1(bond0) entered disabled state [ 1378.657989][T22665] IPVS: ftp: loaded support on port[0] = 21 20:56:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc600a0016400c000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl(r1, 0x8914, &(0x7f00000000c0)="0849420f57581c0afb5b15234602f511c6") r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) [ 1378.688659][T22663] device bond0 entered promiscuous mode [ 1378.712631][T22663] device bond_slave_0 entered promiscuous mode 20:56:26 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6d00}}}}}}}}}, 0x0) [ 1378.750163][T22663] device bond_slave_1 entered promiscuous mode [ 1378.767345][T22675] netlink: 126166 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1378.788653][T22655] device bond0 left promiscuous mode [ 1378.794193][T22655] device bond_slave_0 left promiscuous mode [ 1378.822032][T22655] device bond_slave_1 left promiscuous mode [ 1378.849366][T22655] bridge217: port 1(bond0) entered disabled state 20:56:26 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xe803}}}}}}}}}, 0x0) [ 1379.011594][ T27] audit: type=1804 audit(1589144187.044:1781): pid=22636 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1234/cgroup.controllers" dev="sda1" ino=16173 res=1 20:56:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1379.063327][T22665] netdevsim0 speed is unknown, defaulting to 1000 20:56:27 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x1000000}}}}}}}}}, 0x0) [ 1379.159410][T22675] netlink: 126166 bytes leftover after parsing attributes in process `syz-executor.0'. 20:56:27 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3000000}}}}}}}}}, 0x0) [ 1379.764589][T22712] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1379.800416][T22663] bridge217: port 1(bond0) entered blocking state [ 1379.807664][T22663] bridge217: port 1(bond0) entered disabled state [ 1379.817564][T22663] device bond0 entered promiscuous mode [ 1379.823834][T22663] device bond_slave_0 entered promiscuous mode [ 1379.832979][T22663] device bond_slave_1 entered promiscuous mode [ 1379.843883][T22714] device bond0 left promiscuous mode [ 1379.851034][T22714] device bond_slave_0 left promiscuous mode [ 1379.865214][T22714] device bond_slave_1 left promiscuous mode [ 1379.871867][T22714] bridge217: port 1(bond0) entered disabled state [ 1379.916635][ T27] audit: type=1804 audit(1589144187.954:1782): pid=22719 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1235/cgroup.controllers" dev="sda1" ino=16173 res=1 [ 1380.060934][T22668] IPVS: ftp: loaded support on port[0] = 21 20:56:31 executing program 1: unshare(0x40000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.current\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x87f1a7) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x4924924924926d3, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) recvfrom(r0, &(0x7f0000000100)=""/94, 0xfeb3, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x10) 20:56:31 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x5000000}}}}}}}}}, 0x0) 20:56:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000001780)={0x18, 0x0, {0x3, @link_local, 'team_slave_1\x00'}}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010000090000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}}, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000040), 0x4) 20:56:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x817a, r6}}, 0x20}}, 0x0) 20:56:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:31 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6000000}}}}}}}}}, 0x0) [ 1383.322123][T22778] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1383.403780][T22781] device vlan3 entered promiscuous mode [ 1383.419375][T22783] IPVS: ftp: loaded support on port[0] = 21 [ 1383.428281][T22781] device batadv0 entered promiscuous mode 20:56:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:31 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x7000000}}}}}}}}}, 0x0) [ 1383.457185][T22781] device batadv0 left promiscuous mode 20:56:31 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x8000000}}}}}}}}}, 0x0) 20:56:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:31 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x31000000}}}}}}}}}, 0x0) [ 1383.834898][T22784] bridge217: port 1(bond0) entered blocking state [ 1383.845117][T22784] bridge217: port 1(bond0) entered disabled state [ 1383.874640][T22784] device bond0 entered promiscuous mode [ 1383.885149][T22784] device bond_slave_0 entered promiscuous mode [ 1383.909978][T22784] device bond_slave_1 entered promiscuous mode [ 1383.931869][T22778] device bond0 left promiscuous mode [ 1383.938077][T22778] device bond_slave_0 left promiscuous mode [ 1383.960715][T22778] device bond_slave_1 left promiscuous mode [ 1383.988109][T22778] bridge217: port 1(bond0) entered disabled state [ 1384.179432][T22818] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1384.248084][T22815] IPVS: ftp: loaded support on port[0] = 21 [ 1384.462239][T22789] device vlan3 entered promiscuous mode [ 1384.476585][T22789] device batadv0 entered promiscuous mode [ 1384.492788][T22789] device batadv0 left promiscuous mode [ 1384.682714][T22784] bridge217: port 1(bond0) entered blocking state [ 1384.689514][T22784] bridge217: port 1(bond0) entered disabled state [ 1384.698308][T22784] device bond0 entered promiscuous mode [ 1384.703857][T22784] device bond_slave_0 entered promiscuous mode [ 1384.711263][T22784] device bond_slave_1 entered promiscuous mode [ 1384.722004][T22823] device bond0 left promiscuous mode [ 1384.727510][T22823] device bond_slave_0 left promiscuous mode [ 1384.733620][T22823] device bond_slave_1 left promiscuous mode [ 1384.741204][T22823] bridge217: port 1(bond0) entered disabled state [ 1384.887862][T22783] netdevsim0 speed is unknown, defaulting to 1000 [ 1385.774139][ T5301] tipc: TX() has been purged, node left! 20:56:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000016c0)=0x10, 0x4) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=@newlink={0x44, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_OKEY={0x8, 0x5, 0xb237}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x44}}, 0x0) 20:56:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:34 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3d000000}}}}}}}}}, 0x0) 20:56:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0xf, 0xb, 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000fffffff50000001b00000008009a0002"], 0x3}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x40, r2, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x7}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x800}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x82}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004011}, 0x4000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="940000002c00270d00000000000000000000000094b4b93216ca1187f83b1636091c02fcc02ad79fcb169743b296d17cc714b64b82d140ee57c640e7f6fddb24082595fc05c99af0af4fd30b237077b40a5c13b66e2f6dfe05d79a27e3d02052632a2972b6bbe878734d7ec7a5a851da47354ff346f0c16ed1b653d693c1049ffb8242860e5409eef84f6e2cf21becab63da10a04e6c7735a14832f7ab771cc036a7b443f28e9b2867c59d4a9a911783b23f8b9bb1d1f3e0aafc591e8451fe4faf2b4ade00b6134a90db2052c5b0", @ANYRES32=r5, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/328]}, 0x1c0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc000000240007051500000000000c0000000000", @ANYRES32=r7, @ANYBLOB="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"], 0xcc}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x40001}], 0x1, 0x0) 20:56:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6}}, 0x20}}, 0x0) [ 1386.576124][T22875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1386.624910][T22878] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:56:34 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x3f000000}}}}}}}}}, 0x0) [ 1386.651965][ T27] audit: type=1804 audit(1589144194.684:1783): pid=22877 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1239/cgroup.controllers" dev="sda1" ino=16370 res=1 [ 1386.726704][T22884] bridge217: port 1(bond0) entered blocking state [ 1386.737891][T22884] bridge217: port 1(bond0) entered disabled state [ 1386.779620][T22884] device bond0 entered promiscuous mode [ 1386.805711][T22884] device bond_slave_0 entered promiscuous mode [ 1386.823319][T22884] device bond_slave_1 entered promiscuous mode 20:56:34 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x40000000}}}}}}}}}, 0x0) [ 1386.859795][T22875] device bond0 left promiscuous mode [ 1386.866944][T22875] device bond_slave_0 left promiscuous mode [ 1386.895953][T22875] device bond_slave_1 left promiscuous mode [ 1386.917283][T22875] bridge217: port 1(bond0) entered disabled state 20:56:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x60000000}}}}}}}}}, 0x0) 20:56:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x6d000000}}}}}}}}}, 0x0) 20:56:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x8dffffff}}}}}}}}}, 0x0) [ 1387.358103][ T27] audit: type=1804 audit(1589144195.394:1784): pid=22909 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1240/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 1387.492281][T22887] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1387.536484][T22913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x50, 0x2, 0x6, 0xb, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x4}]}, 0x50}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[], 0x38}}, 0x400c840) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, 0x0, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8982, &(0x7f00000000c0)={0x6, 'macvlan1\x00', {0x4}, 0x81}) 20:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000008000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efeee5eab7ff8a8cdc21ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c4631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6dba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee41f5b2e7b91c61ced1ebad000000000000e8122a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d4524847d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfae5884e4ba1e9cc4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000180)={r5, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r5, @in={{0x2, 0x4e23, @multicast2}}, 0x5, 0x2, 0xffff4dcb, 0x5, 0x2}, &(0x7f0000000040)=0x98) 20:56:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xe8030000}}}}}}}}}, 0x0) [ 1387.599552][T22884] bridge217: port 1(bond0) entered blocking state [ 1387.608530][T22884] bridge217: port 1(bond0) entered disabled state [ 1387.651461][T22884] device bond0 entered promiscuous mode [ 1387.681605][T22884] device bond_slave_0 entered promiscuous mode 20:56:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xf5ffffff}}}}}}}}}, 0x0) [ 1387.720869][T22884] device bond_slave_1 entered promiscuous mode [ 1387.767176][ T27] audit: type=1804 audit(1589144195.804:1785): pid=22929 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/923/cgroup.controllers" dev="sda1" ino=16368 res=1 [ 1387.796632][T22915] device bond0 left promiscuous mode [ 1387.802037][T22915] device bond_slave_0 left promiscuous mode [ 1387.827017][T22915] device bond_slave_1 left promiscuous mode [ 1387.863718][T22915] bridge217: port 1(bond0) entered disabled state [ 1387.900852][ T27] audit: type=1804 audit(1589144195.844:1786): pid=22929 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/923/cgroup.controllers" dev="sda1" ino=16368 res=1 20:56:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:36 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xffffff8d}}}}}}}}}, 0x0) 20:56:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) mmap(&(0x7f0000272000/0x4000)=nil, 0x4000, 0x1, 0x10010, r0, 0x4fc29000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x40eae, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000911d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r2}) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000380), 0x4) getsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000600), &(0x7f0000000640)=0x4) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000340)=0x1, 0x4) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd000100006fa63310c0306554362dddcb892eee051404bde5bf296e3c566a03f724f9ead1ef33adfdbe25b8c5236b93b9797b4409f6e370d1515d2e1fa6e267ddd4bdf96a0e9c2402c58374a38378a680a4bf66857da80f6fef8a9b27c0bb8b95a0899fe79ed063", @ANYRES32=0x0], 0x48}}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000080)={0x1, 0x7d, "8bdb4bf0c18e84fe2716947e25eb9771755112e65035987f3933da6b1a8f582137049bea6d5e466a1d926dc5a7b05c451e47ff9213c1cfc2d651b8f207caa75c9d73c0fa40e06de7df12ca0333b6aac460300ff6adde4694001c4c63fd8c67c1050138cdfce0dd5b01db7335173a8e266eb5ed0ad7c648c13e586a5a34"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="154f923d000000002800128009000100766c616e000000001800028006000100000000000c0004000c0000000000000008000500", @ANYRES32=0x0, @ANYBLOB], 0x50}}, 0x0) 20:56:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a818e765b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43e29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c1d4209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5003f6cc7185e99bc93bcb9eb76abba12076a8d076c853092edf73f4224c4e770006630b3a7e43c7e4c90ce6a20fac946584d406aa1cc75103f746d1f026456e44c9a39c62eecdb8bb82ca275e24c5c9095cbc8a6701a2447f9f6e6e4a372717366f176f0e4df46e9e28ede8a00e2a8b3dc"], 0x34}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="50000000100001040000000000000000000000000831471b688f85dffaf7ccedc56ad060ed8f47c4f9e93cdea5bdd13ab37dc429cc3df7db637accbc96fae142e8bd2259a8e8cb2895a4a1104182e8c9db452659fd34afae6995909f2c70d143d3e054eba414d8d6932cc1c62973bbff1b7b9684e42b173859abb4d9e0606cf4ac2e3d6f40c6689c215cbefb85e64201e9dadc5fb8084a3e6c3bc0dbd0e1ef909485d568f7a77f9d6a535b", @ANYRESDEC=r1, @ANYBLOB="00000000000000002800128009000100766c616e000000001800028006000100000000000c0002001f0000001300000008000500", @ANYRES16=r4, @ANYBLOB="f8fe0cf0f1316a8a57cc6ab93efdb668cf4d90ded259318a64e7d6288221217d44ba7c9ceabedd658c5170cc93e8d1c796543d446e89a8a3f3caefe288ae101e5c18dbda0d4eaadac83fa5d178dfb258e9f36cd0380a0a227264f08e89e2bb58b90d8dc0ec47455b031e2a9ce33fb38f35da45bff058adf0089b6cd9c6cb0ee9be0a67427134d5dfafb7f48385d888698f3a00d6de652726d6baa1"], 0x50}, 0x1, 0x0, 0x0, 0x4051}, 0x0) 20:56:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x2}}, 0x20}}, 0x0) [ 1388.715011][T22963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:56:36 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xfffffff5}}}}}}}}}, 0x0) [ 1388.757108][T22964] IPVS: ftp: loaded support on port[0] = 21 [ 1388.791276][T22965] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1388.828028][ T27] audit: type=1804 audit(1589144196.865:1787): pid=22962 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1241/cgroup.controllers" dev="sda1" ino=16065 res=1 20:56:36 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0xffffffff}}}}}}}}}, 0x0) [ 1388.920871][T22968] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1388.951941][T22973] bridge217: port 1(bond0) entered blocking state [ 1388.964189][T22973] bridge217: port 1(bond0) entered disabled state [ 1388.996353][T22973] device bond0 entered promiscuous mode [ 1389.014413][T22973] device bond_slave_0 entered promiscuous mode [ 1389.035340][T22973] device bond_slave_1 entered promiscuous mode [ 1389.058657][T22977] device bond0 left promiscuous mode [ 1389.064415][T22977] device bond_slave_0 left promiscuous mode 20:56:37 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1389.100937][T22977] device bond_slave_1 left promiscuous mode [ 1389.129455][T22977] bridge217: port 1(bond0) entered disabled state 20:56:37 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3}}}}}}}}}, 0x0) [ 1389.291050][T22963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:56:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:37 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x5}}}}}}}}}, 0x0) [ 1389.541853][T22996] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 1389.587886][ T27] audit: type=1804 audit(1589144197.625:1788): pid=22997 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1242/cgroup.controllers" dev="sda1" ino=16113 res=1 [ 1390.001856][T22983] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1390.020771][T22964] netdevsim0 speed is unknown, defaulting to 1000 [ 1390.028360][T22965] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1390.103001][T22973] bridge217: port 1(bond0) entered blocking state [ 1390.112988][T22973] bridge217: port 1(bond0) entered disabled state [ 1390.151117][T22967] IPVS: ftp: loaded support on port[0] = 21 [ 1390.160542][T22973] device bond0 entered promiscuous mode [ 1390.186460][T22973] device bond_slave_0 entered promiscuous mode [ 1390.224683][T22973] device bond_slave_1 entered promiscuous mode [ 1390.259695][T22999] device bond0 left promiscuous mode [ 1390.267243][T22999] device bond_slave_0 left promiscuous mode [ 1390.288702][T22999] device bond_slave_1 left promiscuous mode [ 1390.310951][T22999] bridge217: port 1(bond0) entered disabled state 20:56:38 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:38 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x6}}}}}}}}}, 0x0) 20:56:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1390.805120][T22967] netdevsim0 speed is unknown, defaulting to 1000 [ 1390.859210][ T27] audit: type=1804 audit(1589144198.895:1789): pid=23044 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1243/cgroup.controllers" dev="sda1" ino=16018 res=1 [ 1390.915114][T22996] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:56:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000500)='f', 0x1}], 0x1) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) r6 = openat$cgroup_int(r3, &(0x7f0000000000)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10012, r6, 0xedd06000) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000780)) 20:56:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x3}}, 0x20}}, 0x0) 20:56:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) ioctl(r0, 0x8, &(0x7f0000000100)="145aa3ac7d3ee78f774feea58646a1548d78f3f9f6c30043735d785ec6e7569c7eb31b73cd811533255453e5775a2b2d5ad88a6e5d3bc40bfe855dd018cf7599445db092a4b3ec3bbc02f8d3552db80b2ab739c205489f9dc2fb55b05b23b1c8ac009f2eac939f0b2ec0593b1951e1d15a4fa64e769d77ccf32b") sendfile(r3, r2, 0x0, 0x100000001) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4086, 0xfffffffffffffe73}], 0x1, 0x0) 20:56:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x7}}}}}}}}}, 0x0) 20:56:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x8}}}}}}}}}, 0x0) [ 1394.137137][T23153] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1394.148531][ T27] audit: type=1804 audit(1589144202.185:1790): pid=23154 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1399/memory.events" dev="sda1" ino=16229 res=1 20:56:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="4000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000002680)=@newtfilter={0x4cc, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4a0, 0x2, [@TCA_U32_SEL={0x494, 0x5, {0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x7fff, 0x80000001, 0x4, 0xfffffc00}, {0x8, 0x0, 0x7, 0x55}, {0x6, 0x3, 0x1, 0x2}, {0x7, 0x6, 0x4, 0xffffffff}, {0x1f, 0x3, 0x7, 0xfc}, {0x6, 0xfff, 0x23e1, 0x2}, {0x1, 0x57d2a78b, 0x7, 0x80}, {0x10000, 0x0, 0x20, 0x6}, {0x921, 0x37, 0x200, 0x9}, {0x1, 0xc1d, 0x3f}, {0x7, 0x9, 0xe7, 0x3}, {0x6, 0x4, 0x5, 0x14000000}, {0x4, 0x7, 0x8, 0x866}, {0x7, 0x6, 0x3, 0x31}, {0x1, 0xffff, 0xc3a3, 0x8}, {0x80000000, 0x2, 0x9, 0x6}, {0x6, 0x8, 0x2, 0x7}, {0x6, 0x7, 0x10000, 0x4}, {0x0, 0x7, 0x0, 0x8}, {0x6, 0x2, 0x800, 0xbd4}, {0x0, 0xfc000000, 0x5, 0xffffff81}, {0x200, 0x5, 0x8, 0x85af}, {0x1c000, 0x1, 0x7fff, 0x7fff80}, {0x100, 0x80000000, 0x0, 0x1}, {0x7fffffff, 0x3, 0x5, 0x5}, {0x4ea, 0x5, 0x6, 0x2}, {0x8, 0x0, 0x8, 0x3}, {0x1, 0x7, 0x4, 0x4422}, {0x5, 0x20, 0x6, 0xfffffc01}, {0x8, 0x0, 0x7fff, 0x1}, {0x9, 0xffff38ca, 0x6}, {0xb0c1, 0x80000001, 0x4, 0x933b}, {0x8, 0x9, 0x5, 0x8000}, {0x9, 0x3, 0x0, 0x8}, {0x7fff, 0x55, 0xff, 0x1}, {0x3, 0xffffffff, 0x0, 0xc68f}, {0x2, 0x8000, 0x9f, 0x14}, {0x20, 0x57, 0x2aec, 0x7}, {0x8, 0x2, 0xfff, 0x6}, {0x81, 0x0, 0x1, 0x8001}, {0x7, 0x3, 0x6, 0x3}, {0x80000001, 0x7, 0x8001, 0x2}, {0x0, 0x2a, 0xdc}, {0x9, 0x0, 0x4, 0x2}, {0x80000001, 0x1, 0x80000000, 0x81}, {0x4, 0x2, 0x66}, {0x6, 0x1, 0x0, 0x3f}, {0x1, 0x80000000, 0xee, 0xb6}, {0x1, 0x9, 0x40, 0x7}, {0x2, 0x80000000, 0x80000000, 0xbe09}, {0x8, 0x80000001, 0x0, 0x6a}, {0x5, 0x9, 0x40000, 0xf9}, {0x0, 0x3, 0xf547, 0x1ff}, {0x2, 0x9, 0x9, 0x5}, {0x6, 0xffff, 0x1, 0x3}, {0x5, 0x1, 0x8}, {0x6, 0x80000001, 0x9, 0x7fff}, {0xfffffff8, 0x7, 0x5, 0x4}, {0xff, 0xf8, 0xae, 0x7fff}, {0x7f, 0x7d0, 0x7, 0x9}, {0xfffffff8, 0x80000, 0x81, 0x6}, {0xe1, 0x1, 0x5, 0x80}, {0x8, 0xffffffff, 0x0, 0x3c3a}, {0x9, 0x8, 0x1f60}, {0x3ff, 0x7, 0x7}, {0x0, 0xe6bc, 0x1}, {0x3ff, 0x3, 0x80000001, 0xb9}, {0x3, 0x3, 0x0, 0x80000001}, {0x8, 0x36b, 0x8, 0x9}, {0x70, 0x9, 0x8, 0xffffffc0}, {0xffffffff, 0x10001, 0x1000, 0x1ff}, {0x2, 0x7fffffff, 0x7fff}]}}, @TCA_U32_FLAGS={0x8, 0xb, 0x2}]}}]}, 0x4cc}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002540)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32, @ANYBLOB="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"], 0x94}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r6, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmmsg$inet(r1, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000400)="8e114fbdae083f12c4a1116ff2f9b4f108a7513683e3240fa372ac1cf14059b4496efe4ad44866a029e0c902dc265a86d4492f93c355c11207bc9883c282915836d8d0daa32c2e7d65a345de5b63db82d2803942e3772b25460353a40a935d2f7b799403ecf9e7ec67e9b9398e739edeae174c191a11fd9dc3058277d61c6c05caabf93912b9644830e86df9c2b09b03693862a4096a2d9dcd6e92786687a851fb2a5f8e2835d4", 0xa7}, {&(0x7f00000004c0)="d0d16cfc26e943fba1796db6b55ba2c03560bc296f786af027b945dd819a44497c7a2382a80c4126f5d6d5f12234156787731eb2b11cdf5c8e6421386f6a91dc30a3b6b207f877c46d0e715d84e70726da54aa515b5913179c73c197b7d3296dc372260542032a0d4f359a43209db9c469c43bb70b7e6a54af52e314adc9d644c90f10a6eca33fc0f56ad40aaaa65d59d953cdd03feb54ff7bfc9305426a250130359b4232dc38fcc62b18282079faf8b65e112b75f4aac1cec416063ac9da6e568a73729304d8daa44702c9cd31d8d4e533313b5b735a61e8bbf239dfc0", 0xde}, {&(0x7f00000005c0)="bf8a971b086fffbfffb9d10fb8e0dd1ba31844d443701d463a08f2e3a89fb78eafcfca6c9eb01da7ce2322f74ffe027c576088d0b316163b35e6af32cea5201c9c915d7e8ae2c058473e54c444dc774c81b3842089107aba4025d51787894ce910a282035f893fbdefa011ccfe1a3427c82d90f0da647b7213cbe7782913ad18c767baa871cc475957ac1be0011f7bf8736d53a73a83e5fc20bb0e676e10fe91bac0ff7df4851de0b0f887f900a8818e1036d4dfcea9ee44f887e76815b990fc8028a6bbd969bedd5528eca74dec1baaaecab5eac1ed87ba7434583be41b0c67a858c61c7d9c", 0xe6}, {&(0x7f0000000340)="a83b15de3b878a47cacc26dd72d6257890686af711a1d6c2598bc130bc89f5ac11b34be77c4db8a9421cf052e13fda622ce74e755b25bc7707f3c7a7c3aa5f29b2341829abf35b98432df9e818452094c70a", 0x52}, {&(0x7f00000001c0)="b73c0acafe677eca632f5647e34df6d32797f2b8fe624836dcfa6b00a39cf42c49700e324f888ac2721fc4ab5272e4f51cc550974bd4fe89e8", 0x39}, {&(0x7f00000002c0)="74be60ddeb0693c4547a33d606f4e0c980421be9490dd4f0d7331261f3019e342eb6254a", 0x24}], 0x6}}, {{&(0x7f0000000740)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000780)="9871af6c721c5d51138202e868f28bdcd82544c23ecd579217fcb5560cce6f3c93e5a7d184ffcff006329feddfbfd1baaf8dd0b30cb914ce3cbd55b754f5f4a984d0a360634587d24b4fdb675505ec2205969aedb670669e6741fa833a0fc751ebf4a3929977162f388688b1531e70e8ac8353ec74f8284ea76bf28a4c61496d1283cda27ce77268926f762fedfdf398027dcf0ad631d1c2bc8d225e953ce6331eea6d452671c1e0b31e218f27a4022bbae6228ad406d148f5dbb43c105b7cd248ed88530793f8a808ad27b78efa129c83cb941a04e9", 0xd6}, {&(0x7f0000000880)}, {&(0x7f00000008c0)="1cc4bc635943661c", 0x8}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="eb9fa44fd9b73ff47bfa297a4d0a21cf14dd81290c4b5ec5ba8e552906f9ecf2e35d914f3f22b182e5cdc0af18e38c6529b4570c68282dee52d066057276bd940d95eb03f67871ce9c0bd9588f9e1e50d1d534f809293a01", 0x58}], 0x5, &(0x7f0000001a00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_retopts={{0x68, 0x0, 0x7, {[@rr={0x7, 0x7, 0xc4, [@dev={0xac, 0x14, 0x14, 0x34}]}, @ra={0x94, 0x4}, @cipso={0x86, 0x35, 0x1, [{0x6, 0xf, "86f31cd57cfc7168c140a47fbe"}, {0x0, 0xc, "c9b79d01c407f1b0df91"}, {0x0, 0x10, "e66b1125d1e87e0ca4b633ff549a"}, {0x7, 0x2}, {0x0, 0x2}]}, @noop, @ssrr={0x89, 0xb, 0xd9, [@empty, @rand_addr=0x64010101]}, @noop, @lsrr={0x83, 0x7, 0x2a, [@local]}, @ra={0x94, 0x4}]}}}, @ip_retopts={{0x48, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0x8d, [@dev={0xac, 0x14, 0x14, 0x27}, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @loopback, @private=0xa010101, @broadcast]}, @lsrr={0x83, 0x7, 0x1e, [@loopback]}, @lsrr={0x83, 0x13, 0xa2, [@rand_addr=0x64010101, @local, @remote, @broadcast]}]}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@end, @generic={0x89, 0xb, "d283d0a14dceaca281"}, @generic={0x94, 0x9, "c1838203132729"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x120}}, {{&(0x7f0000001b40)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000001e00)=[{&(0x7f0000001b80)="d2f9ba982b16ba89e0645465990d8e8ba3a5a2e3db497d55b6686ad1d8ebf5385f42f409986ef8a4f4bfa0eb6d7d4e3e3de39afebab4df0e38df3cd41066", 0x3e}, {&(0x7f0000001c00)="ac264a8dcd1e754637b8587eb76753caa1945b79734e73dda1e3c4a913acd260f2941f672f81da5d5d8c313d4ad1d5e3e825f84ff660cdf2901bcee00b3d3e4ab5b3abf35652472bf46958cbac20ea0cfe9b468b86e4caeb81d51c35c2373c23a5db0c7b178ef41659161de8d5671de02b36a2c4441013e5f6466ef334e5244fceadb990a5505f254334224cd89b9b769d252b6b972ec689b73018a757a51bf66ec997bbb911fa386d50f15a38b8f20c416b46b5cba45118f1a853b957062e9d66c303e3088f80024fb56683809aff23a0b969b00ea21fb294bc61", 0xdb}, {&(0x7f0000001d00)="7dde730ca755510712634c536dc8505dc4d56a1c4d99378c4976caf499f497b84fe17380dbcade958b8210a8b75671bbaf0a6359382796ebcd06", 0x3a}, {&(0x7f0000001d40)="747dc2258dcb4f81f7bd1acdd6369b2fa18024ae5d6ef7330aecb675f733d989a2a50b117a63a6b6f363a7aef68959d36be1d04530fb9544ff254dbd943a474fc4ddd1f1d28b0b40fcbf8539641de167b8b5d7b953fd8f7b9a940de076cbdf4a23758fe7cedb985e2fff9ec9f66ff5a77457be1d47909dcf020b7d77b5a7a9e81a22237454ca76508bb8eb23474e39b68784f2d1546c9b58ae04ab55e89bedc909eed65bb0f90e609c75de4b2c6c336ae87c36cb5ee9367941a549d9d8", 0xbd}], 0x4, &(0x7f0000001e40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfa}}, @ip_retopts={{0x2c, 0x0, 0x7, {[@end, @timestamp_addr={0x44, 0x14, 0x30, 0x1, 0x3, [{@loopback}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}, @ssrr={0x89, 0x7, 0x81, [@rand_addr=0x64010101]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0xc8}}, {{&(0x7f0000001f40)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001f80)="22912816bb274925dbaa5fabd984d9f805441d16c30a9fc044b2a03ae25e16e0f320b86364d0b2538b96a2515e8bc83e574c229ec1dbbc28c754132f581c39f8db9151d7451af73873a08c68c440b7c2146e4310e4b67ff4281ed29fe8ea568799fba5987a6019384731bca12a9e2beadf1c98a3ecea0768eeab77eb69441c6b0b7a39eeea41bfe5874b0a4f04c5df0de9c94bd09a505a933369", 0x9a}], 0x1, &(0x7f0000002080)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}], 0x18}}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f00000020c0)="97a82a640e3f324aabc1b2a61a76447c33256122848278d8a923507721bed909f5d080ea2bf72eb4ffde9ce815303ad018e6f75ccfa74b97208c788472f9f3d7b3343f022e1b446aef2b955328712527f666349c66bdbe9d843b6549ee8165eb730dde5c4008119027ec42f0ebb9631eb97c5498421aabcbd52254f6ab5c615f944b3a5ee83180f9db1176d5ef1b7057228b32f93f0d222e2676c37f1d39f1679d5de41e9a6ae782d67125acd197ffc407ca1ff35602e0d3de98a1c04dead0a742fe8199a6315b26e1113aaf3659b23cf2cf265a065b3bf75541f5329c60cb718532bc2cc0c3fe5c68aa33ac3f838185be377f67", 0xf4}, {&(0x7f00000021c0)="6cb8e1203953935a3ca2760205464ce528816f545411c0f596f6f4419e7bca26f3d6cc2d9d38e1b5da679fa0f10da3dee444e1ce3ac4093597c965", 0x3b}, {&(0x7f0000002200)="5cb557b573d8b94d02c5fea767627ef8f3916afc9161693fc8328acc7c0bb2c7f16cf0bd96f446f9abd8fb1cdfe007454370fa95974e01ff32c26a7d2ee935f6d439a8e91f0be7a52a4c68270fe840910a909adde58ef0175e8443848bfa52f71a7815f79cc3b49ef93a0cce97af539a11ad9d2959bc4ffbb65a65f689288e2388050913ff88e1d41bbddb6e6775f87730fbe618fcae64caecab145ae33863f8bc114e4699749f80e8ac3ed2942185e5cf9a924377e0b60d598992c698621448fabcd9edba8278c736bbf5264a9f43a8639a4fdafcf205f0d388825b7516ebef9cd47e242708ceb42af83cc7b3966b3ca6b505106e70", 0xf6}, {&(0x7f0000002300)="4aa385df8b09362a0fea5f7dcfb97c84efbde2d3b56453d6699e2100447209a795f9671c25b0babdc45d10302bf51792bcca33f7e019f1fa3b17b26f3d0fbd", 0x3f}], 0x4, &(0x7f0000002380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xbe9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x68}}], 0x5, 0x1) [ 1394.235484][T23159] bridge217: port 1(bond0) entered blocking state [ 1394.241996][T23159] bridge217: port 1(bond0) entered disabled state 20:56:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1394.266898][ T27] audit: type=1800 audit(1589144202.185:1791): pid=23154 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16229 res=0 [ 1394.299399][T23159] device bond0 entered promiscuous mode 20:56:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x31}}}}}}}}}, 0x0) [ 1394.331184][T23159] device bond_slave_0 entered promiscuous mode [ 1394.343375][ T27] audit: type=1804 audit(1589144202.215:1792): pid=23157 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1399/memory.events" dev="sda1" ino=16229 res=1 [ 1394.372127][ T27] audit: type=1800 audit(1589144202.215:1793): pid=23157 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16229 res=0 [ 1394.387164][T23159] device bond_slave_1 entered promiscuous mode [ 1394.417318][T23164] device bond0 left promiscuous mode [ 1394.417330][T23164] device bond_slave_0 left promiscuous mode [ 1394.417512][T23164] device bond_slave_1 left promiscuous mode 20:56:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3d}}}}}}}}}, 0x0) [ 1394.417955][T23164] bridge217: port 1(bond0) entered disabled state [ 1394.487750][ T27] audit: type=1804 audit(1589144202.525:1794): pid=23179 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1245/cgroup.controllers" dev="sda1" ino=15748 res=1 20:56:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x60}}}}}}}}}, 0x0) [ 1395.194008][T23159] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x6d}}}}}}}}}, 0x0) 20:56:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4}}, 0x20}}, 0x0) 20:56:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) setsockopt$SO_J1939_FILTER(0xffffffffffffffff, 0x6b, 0x1, &(0x7f0000000280)=[{0x1, 0x0, {0x2, 0xff, 0x2}, {0x2, 0x1, 0x2}, 0x1, 0x2}, {0x1, 0x0, {0x0, 0xff}, {0x0, 0x0, 0x4}, 0x0, 0x2}, {0x0, 0x0, {0x1, 0xf0, 0x1}, {0x1, 0x0, 0x2}, 0x1, 0x2}], 0x60) r4 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xd8, r5, 0x20, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:hald_cache_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg2\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x4}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:etc_mail_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4000011}, 0x40000) sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0c0e28bd7000fddbdf25050000002200070073797374656d5f755d4b24ef7f721768b7390000766c6f675f743a73300000005f4897424df9e8c7868da022d0c05a9ed72fa54a3a31d2931aa96c7875402e5f5ad06a4f8e56db79641870e00537f7b83b0bf1781bc47f101b556c239c13db7c55ed820e1e71a6df6d96ec8e66ae083876143ac69e754d46ed8a3b6188dc0a454ff91ecaae1901000550c61a5e1948bef5"], 0x38}}, 0x4004001) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r6 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) connect$tipc(r6, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x4}}, 0x10) socket(0x2c, 0x0, 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 20:56:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x300}}}}}}}}}, 0x0) [ 1395.913100][ T27] audit: type=1804 audit(1589144203.945:1795): pid=23241 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1246/cgroup.controllers" dev="sda1" ino=16232 res=1 20:56:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3e8}}}}}}}}}, 0x0) 20:56:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x500}}}}}}}}}, 0x0) 20:56:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x600}}}}}}}}}, 0x0) 20:56:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1396.239572][T23238] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1396.279098][T23245] bridge218: port 1(bond0) entered blocking state 20:56:44 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x700}}}}}}}}}, 0x0) [ 1396.295294][T23245] bridge218: port 1(bond0) entered disabled state [ 1396.309934][T23245] device bond0 entered promiscuous mode [ 1396.317805][T23245] device bond_slave_0 entered promiscuous mode [ 1396.331998][T23245] device bond_slave_1 entered promiscuous mode [ 1396.361138][T23248] device bond0 left promiscuous mode [ 1396.374400][T23248] device bond_slave_0 left promiscuous mode [ 1396.398019][T23248] device bond_slave_1 left promiscuous mode [ 1396.419954][T23248] bridge218: port 1(bond0) entered disabled state [ 1396.436090][ T27] audit: type=1804 audit(1589144204.475:1796): pid=23270 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1247/cgroup.controllers" dev="sda1" ino=16218 res=1 [ 1396.630600][T23245] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1396.670033][T23238] bridge218: port 1(bond0) entered blocking state [ 1396.682451][T23238] bridge218: port 1(bond0) entered disabled state [ 1396.708485][T23238] device bond0 entered promiscuous mode [ 1396.719372][T23238] device bond_slave_0 entered promiscuous mode [ 1396.729568][T23238] device bond_slave_1 entered promiscuous mode [ 1396.742357][T23282] device bond0 left promiscuous mode [ 1396.755610][T23282] device bond_slave_0 left promiscuous mode [ 1396.768889][T23282] device bond_slave_1 left promiscuous mode [ 1396.782350][T23282] bridge218: port 1(bond0) entered disabled state 20:56:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000000)=[{&(0x7f0000000080)="4500000038000535a4abd32b8018007a022482c137153e37100001800125d124000000b3e9d3dfd08300000000000000", 0x30}, {&(0x7f0000000100)="6a2a261bb49c3cfd4a93b0ed6022ad8aa9859d8787", 0x15}], 0x2}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000140)=0x4) 20:56:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3100}}}}}}}}}, 0x0) 20:56:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r6, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) getsockname$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x1c) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r8, &(0x7f0000004680)={&(0x7f00000044c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000004640)={&(0x7f0000004500)={0x114, 0x3, 0x8, 0x5, 0x0, 0x0, {0x6, 0x0, 0x5}, [@CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x40}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x400}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x401}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8f}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x66}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9300}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffff03c}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x114}, 0x1, 0x0, 0x0, 0x40d0}, 0x40000) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r7, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010b95bbf1e2031c3be883300010400000700000000000000b1bdfa632f20fcf90f3d7b2a1ca57bf96be5fac42f13a4a5acc0bb9f57344fb1166acadc9368d18cfb4a56c139086c8952caeeea9f21ecb34431e34a342a0bd685e8f01b80365aae6f94", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r7], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=r7], 0x20}}, 0x0) 20:56:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x5}}, 0x20}}, 0x0) [ 1397.293712][T23306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1397.320924][T23310] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1397.358871][ T27] audit: type=1804 audit(1589144205.395:1797): pid=23308 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1248/cgroup.controllers" dev="sda1" ino=16257 res=1 [ 1397.376754][T23310] netlink: zone id is out of range [ 1397.392381][T23309] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3d00}}}}}}}}}, 0x0) [ 1397.431136][T23316] bridge218: port 1(bond0) entered blocking state [ 1397.466646][T23316] bridge218: port 1(bond0) entered disabled state 20:56:45 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "1000", 0x4c, 0x2f, 0x0, @private1, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0, 0x0, 0x0]}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "a3b2"}, {0x7}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0xfffd}}}}}}}}}, 0x0) 20:56:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x3f00}}}}}}}}}, 0x0) [ 1397.507628][T23316] device bond0 entered promiscuous mode [ 1397.542112][T23316] device bond_slave_0 entered promiscuous mode [ 1397.568216][T23316] device bond_slave_1 entered promiscuous mode [ 1397.593320][T23309] device bond0 left promiscuous mode [ 1397.598638][T23309] device bond_slave_0 left promiscuous mode [ 1397.627911][T23309] device bond_slave_1 left promiscuous mode [ 1397.660781][T23309] bridge218: port 1(bond0) entered disabled state 20:56:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x4000}}}}}}}}}, 0x0) 20:56:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000b71000/0x4000)=nil, 0x4000, 0x1000006, 0x40010, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x17, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffc, 0x3, 0x4}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0x1, &(0x7f0000000180)='^_`\xd8Tserke\xa5\x00\x00\x00\x00\x00\x00\x00\x19H\x16\xc7'}, 0x30) bind$x25(r2, &(0x7f00000000c0)={0x9, @remote={[], 0x3}}, 0x12) ppoll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x1740}], 0x0, 0x0, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @dev}}) 20:56:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000fffffff50000001b00000008009a0002"], 0x3}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x48, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x10000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'bond_slave_0\x00', &(0x7f00000000c0)=@ethtool_channels={0x3d}}) 20:56:45 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x6000}}}}}}}}}, 0x0) 20:56:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x6d00}}}}}}}}}, 0x0) 20:56:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0xe803}}}}}}}}}, 0x0) [ 1398.229009][ T27] audit: type=1804 audit(1589144206.265:1798): pid=23362 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1249/cgroup.controllers" dev="sda1" ino=16161 res=1 [ 1398.426689][T23360] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1398.448610][T23316] bridge218: port 1(bond0) entered blocking state [ 1398.456707][T23316] bridge218: port 1(bond0) entered disabled state [ 1398.472587][T23316] device bond0 entered promiscuous mode [ 1398.479610][T23316] device bond_slave_0 entered promiscuous mode [ 1398.487006][T23316] device bond_slave_1 entered promiscuous mode [ 1398.498548][T23363] device bond0 left promiscuous mode [ 1398.504955][T23363] device bond_slave_0 left promiscuous mode [ 1398.529272][T23363] device bond_slave_1 left promiscuous mode [ 1398.553866][T23363] bridge218: port 1(bond0) entered disabled state 20:56:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6}}, 0x20}}, 0x0) [ 1399.099104][T23387] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1399.118991][T23387] bridge218: port 1(bond0) entered blocking state [ 1399.125941][T23387] bridge218: port 1(bond0) entered disabled state [ 1399.133374][T23387] device bond0 entered promiscuous mode [ 1399.139152][T23387] device bond_slave_0 entered promiscuous mode [ 1399.145889][T23387] device bond_slave_1 entered promiscuous mode 20:56:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:47 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0xffff}}}}}}}}}, 0x0) 20:56:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:47 executing program 1: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x4000}}}}}}}}}, 0x0) [ 1399.182081][T23387] device bond0 left promiscuous mode [ 1399.187486][T23387] device bond_slave_0 left promiscuous mode [ 1399.203286][T23387] device bond_slave_1 left promiscuous mode [ 1399.229766][T23387] bridge218: port 1(bond0) entered disabled state 20:56:47 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1399.370913][ T27] audit: type=1804 audit(1589144207.405:1799): pid=23398 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1250/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1399.901344][T23421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1399.935057][T23387] bridge218: port 1(bond0) entered blocking state [ 1399.941550][T23387] bridge218: port 1(bond0) entered disabled state [ 1399.951135][T23387] device bond0 entered promiscuous mode [ 1399.957800][T23387] device bond_slave_0 entered promiscuous mode [ 1399.974213][T23387] device bond_slave_1 entered promiscuous mode [ 1399.989211][T23421] device bond0 left promiscuous mode [ 1399.996946][T23421] device bond_slave_0 left promiscuous mode [ 1400.004227][T23421] device bond_slave_1 left promiscuous mode [ 1400.010635][T23421] bridge218: port 1(bond0) entered disabled state 20:56:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYRES16=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) gettid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r7, 0x40305839, &(0x7f0000000240)={0x0, 0x0, 0x2be20000}) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(r5, r6, 0x0, 0xf03b0000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 20:56:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x3}}}}}}}}}, 0x0) 20:56:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x7, 0x6, 0x401}, 0x14}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6, 0x2, 0x39}]}}}]}, 0x38}}, 0x0) r1 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000000)=0x120, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x190, 0x1, 0x3, 0x301, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x63b9}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x8}}, @NFQA_CT={0x168, 0xb, 0x0, 0x1, [@CTA_NAT_DST={0x8c, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010101}, @CTA_NAT_V6_MINIP={0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}]}, @CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast2}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x7004}, @CTA_ID={0x8}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_NAT_SRC={0xc0, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @private1={0xfc, 0x1, [], 0x1}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, [], 0x1d}}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}, @CTA_NAT_PROTO={0x54, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x7fff}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x8005}, 0x9050) 20:56:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1400.246969][ T27] audit: type=1804 audit(1589144208.285:1800): pid=23438 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1251/cgroup.controllers" dev="sda1" ino=16379 res=1 20:56:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 20:56:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x7}}, 0x20}}, 0x0) 20:56:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x7, 0x6, 0x401}, 0x14}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) 20:56:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f00003dc000/0x1000)=nil, 0x1000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="31c2eaec21", @ANYRES16=r3, @ANYBLOB="2b0f000000000000000067"], 0x3}}, 0x0) accept$netrom(r1, &(0x7f00000000c0)={{}, [@default, @default, @bcast, @default, @default, @bcast, @remote, @rose]}, &(0x7f0000000000)=0x48) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10010000ffec) 20:56:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1400.818594][T23459] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:48 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x6}}}}}}}}}, 0x0) [ 1400.876858][T23467] bridge218: port 1(bond0) entered blocking state [ 1400.907038][T23467] bridge218: port 1(bond0) entered disabled state [ 1400.956983][T23467] device bond0 entered promiscuous mode [ 1400.974516][ T27] audit: type=1804 audit(1589144209.015:1801): pid=23465 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1252/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1400.994196][T23467] device bond_slave_0 entered promiscuous mode [ 1401.073906][T23467] device bond_slave_1 entered promiscuous mode [ 1401.126918][T23459] device bond0 left promiscuous mode [ 1401.132445][T23459] device bond_slave_0 left promiscuous mode [ 1401.166659][T23459] device bond_slave_1 left promiscuous mode [ 1401.214661][T23459] bridge218: port 1(bond0) entered disabled state [ 1401.720476][ T27] audit: type=1804 audit(1589144209.755:1802): pid=23471 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1405/cgroup.controllers" dev="sda1" ino=16379 res=1 20:56:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYRES16=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) gettid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r7, 0x40305839, &(0x7f0000000240)={0x0, 0x0, 0x2be20000}) write$cgroup_int(r5, &(0x7f0000000200), 0xf000) sendfile(r5, r6, 0x0, 0xf03b0000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 20:56:49 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x7}}}}}}}}}, 0x0) 20:56:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x7, 0x6, 0x401}, 0x14}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1401.802129][ T27] audit: type=1804 audit(1589144209.755:1803): pid=23475 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1405/cgroup.controllers" dev="sda1" ino=16379 res=1 20:56:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) [ 1401.923375][ T27] audit: type=1804 audit(1589144209.965:1804): pid=23494 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1405/cgroup.controllers" dev="sda1" ino=16379 res=1 20:56:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0xb, 0x8, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x1, 0xd, 0x2, 0x1, 0x2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xb, 0xb, 0x9, 0xfffffffffffffff8, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0xb, 0x0, 0xfffffffffffffff8, 0x10}]}, &(0x7f0000001080)='syzkaller\x00', 0x4, 0xb1, &(0x7f00000010c0)=""/177, 0x41000, 0x2, [], 0x0, 0x11, r0, 0x8, &(0x7f0000001180)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000011c0)={0x3, 0xc, 0x0, 0x62c1}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1, 0xa, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000030000006da7d788000000001800000091fc000000000000ff000000182b0000", @ANYRES32=r0, @ANYBLOB="000000000001000085100000f9ffffff180000000300000000000000040000009500000000000000"], &(0x7f0000000d00)='GPL\x00', 0x82a6, 0x14, &(0x7f0000000f80)=""/20, 0x41100, 0x8, [], 0x0, 0x11, r0, 0x8, &(0x7f0000000fc0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001000)={0x4, 0x4, 0xfffffff7, 0xc6f}, 0x10, 0xffffffffffffffff, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r7, @ANYBLOB="0903000400000000000003"], 0x3}, 0x1, 0x0, 0x0, 0xc04c000}, 0x0) sendfile(r6, r5, 0x0, 0x100000001) r8 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r8, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffffc) recvmmsg(r8, &(0x7f0000000d80)=[{{&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/123, 0x7b}], 0x1, &(0x7f0000000300)=""/178, 0xb2}, 0x7fffffff}, {{&(0x7f00000003c0)=@nl=@proc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/186, 0xba}, {&(0x7f0000000180)=""/16, 0x10}, {&(0x7f00000005c0)=""/32, 0x20}, {&(0x7f0000000600)=""/77, 0x4d}], 0x5, &(0x7f0000000700)=""/57, 0x39}, 0x9}, {{&(0x7f0000000740)=@xdp, 0x80, &(0x7f0000000a80)=[{&(0x7f00000007c0)=""/84, 0x54}, {&(0x7f0000000840)=""/11, 0xb}, {&(0x7f0000000880)=""/215, 0xd7}, {&(0x7f0000000980)=""/21, 0x15}, {&(0x7f00000009c0)=""/186, 0xba}], 0x5, &(0x7f0000000b00)=""/109, 0x6d}, 0xc205}, {{&(0x7f0000000b80)=@hci, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000c00)=""/123, 0x7b}, {&(0x7f0000000c80)=""/73, 0x49}, {&(0x7f0000000d00)}], 0x3}, 0x7}], 0x4, 0x2000, &(0x7f0000000e80)={0x0, 0x989680}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r9, 0x800443d3, &(0x7f0000000ec0)={@fixed={[], 0x10}, 0x0, 0x7f, 0x4}) [ 1402.017988][ T27] audit: type=1804 audit(1589144210.025:1805): pid=23501 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1253/cgroup.controllers" dev="sda1" ino=16384 res=1 20:56:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x1f}}}}}}}}}, 0x0) [ 1402.103973][T23491] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1402.142055][T23467] bridge218: port 1(bond0) entered blocking state [ 1402.152539][T23467] bridge218: port 1(bond0) entered disabled state [ 1402.189918][T23467] device bond0 entered promiscuous mode [ 1402.220185][T23467] device bond_slave_0 entered promiscuous mode [ 1402.263329][T23467] device bond_slave_1 entered promiscuous mode [ 1402.309190][T23492] device bond0 left promiscuous mode [ 1402.314801][T23492] device bond_slave_0 left promiscuous mode [ 1402.337004][T23492] device bond_slave_1 left promiscuous mode [ 1402.365548][T23492] bridge218: port 1(bond0) entered disabled state 20:56:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x9}}, 0x20}}, 0x0) 20:56:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 20:56:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000280)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="010000fffffff50000001b00000008009a0002"], 0x3}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r5, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x3}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2048014}, 0x24000080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, 0x4000010, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0xfdef) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 20:56:50 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) [ 1402.835706][ T27] audit: type=1804 audit(1589144210.876:1806): pid=23539 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1254/cgroup.controllers" dev="sda1" ino=16379 res=1 20:56:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21b04f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x1, 0x4}}, 0x10) listen(r0, 0x0) 20:56:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 20:56:51 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:51 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) [ 1403.330057][ T27] audit: type=1804 audit(1589144211.366:1807): pid=23556 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1255/cgroup.controllers" dev="sda1" ino=16270 res=1 20:56:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 20:56:51 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1403.470868][T23543] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1403.537243][T23546] bridge218: port 1(bond0) entered blocking state [ 1403.552837][T23546] bridge218: port 1(bond0) entered disabled state [ 1403.597789][T23546] device bond0 entered promiscuous mode [ 1403.623188][T23546] device bond_slave_0 entered promiscuous mode [ 1403.658528][T23546] device bond_slave_1 entered promiscuous mode [ 1403.716366][ T27] audit: type=1804 audit(1589144211.756:1808): pid=23579 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1256/cgroup.controllers" dev="sda1" ino=16270 res=1 [ 1403.717412][T23548] device bond0 left promiscuous mode [ 1403.859642][T23548] device bond_slave_0 left promiscuous mode [ 1403.868729][T23548] device bond_slave_1 left promiscuous mode [ 1403.901539][T23548] bridge218: port 1(bond0) entered disabled state [ 1404.065663][T23578] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1404.102105][T23543] bridge218: port 1(bond0) entered blocking state [ 1404.109906][T23543] bridge218: port 1(bond0) entered disabled state [ 1404.120148][T23543] device bond0 entered promiscuous mode [ 1404.128957][T23543] device bond_slave_0 entered promiscuous mode [ 1404.137318][T23543] device bond_slave_1 entered promiscuous mode [ 1404.147932][T23580] device bond0 left promiscuous mode [ 1404.154423][T23580] device bond_slave_0 left promiscuous mode [ 1404.160707][T23580] device bond_slave_1 left promiscuous mode [ 1404.168769][T23580] bridge218: port 1(bond0) entered disabled state 20:56:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xa}}, 0x20}}, 0x0) 20:56:52 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x11, 0x4, 0x4, 0x4002, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) r1 = socket$caif_seqpacket(0x25, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000080)="49d825b4fbdbfd43e8d626ee7194b4b27d3dd75a3bb29ecff834c03a21b473f6f31aed744b9250a61fe35bddeea6af47311cb9f93990309cfd89bd7ce4cd6a6ff436bb199c260c2d4952a940aa3ef1c44b402bb428fd3c518c0aaf15116c599b0976cf6b10a35601189952bf4ad0429b3e36be20187a347a2a141d7683e1670941d4435497103b68ce076776a20ba0fb7f61914e92f40eda28fb", 0x9a) close(r1) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000180)={{0x32, @multicast2, 0x4e24, 0x1, 'lblc\x00', 0x20, 0x8001, 0x12}, {@broadcast, 0x4e23, 0x10000, 0x401, 0x100, 0x1000}}, 0x44) 20:56:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}}}}}, 0x0) 20:56:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 20:56:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1404.548177][T23603] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1404.630373][T23609] bridge218: port 1(bond0) entered blocking state [ 1404.656775][T23609] bridge218: port 1(bond0) entered disabled state [ 1404.663472][ T27] audit: type=1804 audit(1589144212.696:1809): pid=23606 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1257/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 1404.729121][T23609] device bond0 entered promiscuous mode [ 1404.748829][T23609] device bond_slave_0 entered promiscuous mode [ 1404.769017][T23609] device bond_slave_1 entered promiscuous mode 20:56:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000c00)=ANY=[@ANYRES32=r4, @ANYBLOB="090035007eda5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"], 0x3d) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r4, 0x8000}, &(0x7f00000000c0)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x275a, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000400)="b1", 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r5, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r7, 0x112, 0xa, &(0x7f0000000040), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES64, @ANYRES16], 0x94}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmmsg$sock(r3, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="46d7210275b6146b15ae42a64e8b9f83fed88f768dfc6f48209c3bcd61a43c9c16bf6e7dd59f62bcf1fea0d96ade94b48afedee0efb895deeb796ea3bef63784c07d99965ef73ccf431214a4a4f63755f2d16397081eb1812d3243139a3fcad317bf3365eae7ac1ade727e7f9bf56a9700b831f4e62e88f1537c7fee72c3c2fa514ad0d7924b5b09538b71e7536f4a45a437f7cab8717da1cd2ac90e649c40b13c824f819ae8a9bc8f5eb89f8dbe7e9df3101c78848cfc20b6b242a351", 0xbd}, {&(0x7f0000000100)="7a7377d51c0ce016b6828f57d99db0c5f9e18771f6d4043337a6b6", 0x1b}, {&(0x7f00000002c0)="5c698ce91f1f681e7d40c8a33207f5e82fbea86a7f3283e494b5afb77fb5e2ddf64b7e3fab416113e569bb3241d01568d6e8317b85877a6a3bd295913b09e51c985bd233ac0b06ac12f0f30ed5261443f7c93c19813d57d2fec70a3ebe5f07b135ed6a26a51bb27b34e10a03f74afb275846599f05625a5d246e7c9fb4eb10c2cbbef683a64e3f09563b48c02a92fa7746aa22d858b2d1a870e53489a3b47f777b46917044b89f72988e534021cd2c6e9d672bda7a2bbe8e5f113c04263e3baf45d04bcee42f151199864dfc89278369fd97a835d6266eb6567ab489c0b3d149ff6498dc50eb", 0xe6}], 0x3, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffffffff0000}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffff7fffffff}}], 0xc0}}, {{&(0x7f0000000500)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000580)="9502571a794d0730333f5dbeb0f7f96943089736658845d65ba6c428cc905881457410cd4ecd2ed0fb7f7bb64bd04f376fb9cbc7773946157b9299f85ceb19489b6b3ac105cdb7766cc8ebc97d8200c4b5efe49e1e7ba27a186fc8391dbf460276b046ca9785f9334aae5276d8848d8c3636135c6991552e52346561e4d5630e93142b05456f5034", 0x88}, {&(0x7f0000000640)="8407c1e4dfc464f35ee4c471d923fa5da22350a9cb35720438a1ae65ed4ec792c6b8910f23674d3d1456db9ac00e1bd034ed33085ba83ce0001dcad136190239d7a6f956d6d09e0732333f6bc43cb10c57", 0x51}, {&(0x7f00000006c0)="9120312b0ceceef594ebfe8dee65a3ef86babefe3a913f9adb5dbb76844dad68b94a44ce93bb1297f34c720894e6290b05aed61ed28df023243d13551440404ed307f4ce9018edfa3bab5fd9fccf827b", 0x50}], 0x3, &(0x7f0000000740)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18}}], 0x78}}, {{&(0x7f00000007c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000840)="0b9800028395b242454b55d67d39e1f9614b033a4c1ad632aff78d31a8d7312b152ab48089d7ff75f3b3340993d3d6c7aa5c836d5f13510d2bc358f6b1a2a80a9fe538846aed9a435dba1d03d25e91d6da1cdf8fcadd2d6c4f478aa2671c89d0ec282bb0c003e4233ebd316d63ec05398cef6ad27ba2576b4eee9c09c5d9", 0x7e}, {&(0x7f00000008c0)="c59202675795a0fdcbbfe5147e205354d18d538067e36708ff73636519d6118f2473651cd22eadf13e779e4619dfe77a93946bc63be2c809aa5447097774616f3c846605aa8eb87e8a784b24d4381a6002354cdf5985fbece1f93c60e6e1156feea17b624ef0831c2c24ce47b39e584c73605ae213d7f4ec63136a7f98873c61b5cd8162ff15764fdb569acea0be03bf6f2b51242e1c88abb7bbb47e5c689ceb2fdcd08db5e34d2c9eb25afb6ff39edfc0608ba92fa2956106416b0e7c2a7c7486727a5f5e5440686f3eddeed8674f0af7d221fd9f1368c8012d2ea540bc23ab415318927693a7e1473ddad3dd549292ad1b22a0", 0xf4}], 0x2, &(0x7f0000000a00)=[@mark={{0x14, 0x1, 0x24, 0xfffff801}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x710f}}, @timestamping={{0x14, 0x1, 0x25, 0x2fa0000}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xd19a}}, @txtime={{0x18, 0x1, 0x3d, 0xcb2}}], 0xd8}}], 0x3, 0x4084) 20:56:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 20:56:52 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="a5bc090fe016422737ddfb2f21ac29d5dcbe26f70409ef47b0fafda21ef35d2566af520c697e4a00930d886b6e3f84db3b2589fe2d3640cdf0f65ba7c32f1bceabb75e87ce90d868b41e9258ea311a9ea210df04e6d0753957ff5486e10721a36fbd81f00927a1c3b7d614e0a7b76072d3a4fd17730578325488b0df44e91765012d09efb68ce9ac64d0a61d2a9a83"], 0x0) r1 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r2, &(0x7f0000001440)=""/20, 0x14, 0x40, &(0x7f0000001480)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0xffffff01, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x101}}, 0x24) setsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000000), 0x4) 20:56:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) [ 1404.801264][T23603] device bond0 left promiscuous mode [ 1404.808869][T23603] device bond_slave_0 left promiscuous mode [ 1404.827422][T23603] device bond_slave_1 left promiscuous mode [ 1404.836789][T23603] bridge218: port 1(bond0) entered disabled state 20:56:52 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, r5, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000050}, 0x15) accept4$inet6(r3, 0x0, &(0x7f0000000080), 0x80000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03f28b48fd0010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64000000060c000200080006000000"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) [ 1404.977983][ T27] audit: type=1804 audit(1589144213.016:1810): pid=23621 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1258/cgroup.controllers" dev="sda1" ino=16383 res=1 [ 1405.352391][T23641] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 1405.386028][T23642] bond7: (slave vcan1): no link monitoring support [ 1405.395462][T23642] bond7: (slave vcan1): The slave device specified does not support setting the MAC address [ 1405.408182][T23642] bond7: (slave vcan1): Error -22 calling dev_set_mtu [ 1405.428468][T23609] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1405.607259][T23641] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 20:56:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xc}}, 0x20}}, 0x0) 20:56:53 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) 20:56:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000002) 20:56:53 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0x0, 'fo\x00', 0x0, 0x0, 0x20}, 0x2c) 20:56:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, r5, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000050}, 0x15) accept4$inet6(r3, 0x0, &(0x7f0000000080), 0x80000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03f28b48fd0010", @ANYRES32=r2, @ANYBLOB="004e7c7c5b8a00001c0012000c000100626f6e64000000060c000200080006000000"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) [ 1405.783178][T23740] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1405.805225][T23740] bridge218: port 1(bond0) entered blocking state [ 1405.812210][T23740] bridge218: port 1(bond0) entered disabled state [ 1405.823902][T23740] device bond0 entered promiscuous mode [ 1405.838910][T23740] device bond_slave_0 entered promiscuous mode [ 1405.857408][T23741] IPVS: ftp: loaded support on port[0] = 21 [ 1405.861095][T23740] device bond_slave_1 entered promiscuous mode [ 1405.887516][T23748] device bond0 left promiscuous mode [ 1405.893097][T23748] device bond_slave_0 left promiscuous mode [ 1405.911457][ T27] audit: type=1804 audit(1589144213.946:1811): pid=23745 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1259/cgroup.controllers" dev="sda1" ino=16380 res=1 20:56:53 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x2}}}}}}}, 0x0) [ 1405.921110][T23748] device bond_slave_1 left promiscuous mode 20:56:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) [ 1405.982461][T23748] bridge218: port 1(bond0) entered disabled state 20:56:54 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x3}}}}}}}, 0x0) [ 1406.130790][T23755] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 1406.212357][T23759] bond9: (slave vcan1): no link monitoring support [ 1406.227660][ T27] audit: type=1804 audit(1589144214.266:1812): pid=23761 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1260/cgroup.controllers" dev="sda1" ino=16252 res=1 20:56:54 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x4}}}}}}}, 0x0) [ 1406.255393][T23759] bond9: (slave vcan1): The slave device specified does not support setting the MAC address 20:56:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) [ 1406.297028][T23759] bond9: (slave vcan1): Error -22 calling dev_set_mtu [ 1406.335595][T23741] netdevsim0 speed is unknown, defaulting to 1000 [ 1406.386991][T23740] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:54 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x5}}}}}}}, 0x0) [ 1406.442845][T23748] bridge218: port 1(bond0) entered blocking state [ 1406.456222][T23748] bridge218: port 1(bond0) entered disabled state [ 1406.503869][ T27] audit: type=1804 audit(1589144214.546:1813): pid=23819 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1261/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 1406.504020][T23748] device bond0 entered promiscuous mode [ 1406.600116][T23746] IPVS: ftp: loaded support on port[0] = 21 [ 1406.616586][T23748] device bond_slave_0 entered promiscuous mode [ 1406.624481][T23748] device bond_slave_1 entered promiscuous mode [ 1406.639391][T23818] device bond0 left promiscuous mode [ 1406.645347][T23818] device bond_slave_0 left promiscuous mode [ 1406.651431][T23818] device bond_slave_1 left promiscuous mode [ 1406.724101][T23818] bridge218: port 1(bond0) entered disabled state 20:56:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xe}}, 0x20}}, 0x0) 20:56:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x0) 20:56:55 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x6}}}}}}}, 0x0) [ 1407.094653][ T27] audit: type=1804 audit(1589144215.136:1814): pid=23858 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1262/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 1407.133399][T23857] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1407.144252][ T5340] tipc: TX() has been purged, node left! [ 1407.223578][T23859] bridge218: port 1(bond0) entered blocking state [ 1407.230955][T23859] bridge218: port 1(bond0) entered disabled state [ 1407.253722][T23859] device bond0 entered promiscuous mode [ 1407.259294][T23859] device bond_slave_0 entered promiscuous mode [ 1407.273682][T23859] device bond_slave_1 entered promiscuous mode [ 1407.299754][T23862] device bond0 left promiscuous mode [ 1407.305320][T23862] device bond_slave_0 left promiscuous mode [ 1407.323850][T23862] device bond_slave_1 left promiscuous mode [ 1407.344699][T23862] bridge218: port 1(bond0) entered disabled state [ 1407.635339][T23859] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xa}}, 0x20}}, 0x0) 20:56:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x7}}}}}}}, 0x0) 20:56:56 executing program 3 (fault-call:6 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:56 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000100), 0xe) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @fixed}, &(0x7f00000000c0)=0xe, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r5, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_dellink={0x4c, 0x11, 0x100, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r5, 0x200, 0x30400}, [@IFLA_MAP={0x24, 0xe, {0x7, 0xfff, 0x1bfd, 0x7, 0x3, 0x81}}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x39}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10000}, 0x800) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0x1, &(0x7f0000000000)=0x4) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r6, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r7, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendfile(r6, r7, &(0x7f0000000300)=0x2, 0x0) 20:56:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x10}}, 0x20}}, 0x0) [ 1408.512645][T23875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x9}}}}}}}, 0x0) [ 1408.567917][T23876] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1408.589126][ T27] audit: type=1804 audit(1589144216.626:1815): pid=23880 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1263/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1408.606702][T23882] bridge219: port 1(bond0) entered blocking state [ 1408.616881][T23880] FAULT_INJECTION: forcing a failure. [ 1408.616881][T23880] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.634608][T23882] bridge219: port 1(bond0) entered disabled state [ 1408.659496][T23880] CPU: 1 PID: 23880 Comm: syz-executor.3 Not tainted 5.7.0-rc4-syzkaller #0 [ 1408.668202][T23880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.678266][T23880] Call Trace: [ 1408.681575][T23880] dump_stack+0x188/0x20d [ 1408.684610][T23882] device bond0 entered promiscuous mode [ 1408.685939][T23880] should_fail.cold+0x5/0xa [ 1408.685959][T23880] ? lock_downgrade+0x840/0x840 [ 1408.685979][T23880] ? fault_create_debugfs_attr+0x140/0x140 [ 1408.686002][T23880] should_failslab+0x5/0xf [ 1408.697091][T23882] device bond_slave_0 entered promiscuous mode [ 1408.700847][T23880] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1408.700865][T23880] ? aa_file_perm+0x5be/0x14d0 [ 1408.700885][T23880] ? __lock_acquire+0xcbb/0x4c50 [ 1408.700909][T23880] alloc_pipe_info+0x10a/0x4f0 [ 1408.731440][T23882] device bond_slave_1 entered promiscuous mode [ 1408.732388][T23880] splice_direct_to_actor+0x777/0x980 [ 1408.732412][T23880] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1408.732436][T23880] ? do_splice_to+0x160/0x160 [ 1408.732460][T23880] do_splice_direct+0x1b4/0x280 [ 1408.732477][T23880] ? splice_direct_to_actor+0x980/0x980 [ 1408.732507][T23880] do_sendfile+0x555/0xc50 [ 1408.751050][T23884] bridge6: port 1(bond0) entered blocking state [ 1408.754554][T23880] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1408.754578][T23880] ? wait_for_completion+0x270/0x270 [ 1408.754592][T23880] ? __sb_end_write+0x101/0x1d0 [ 1408.754607][T23880] ? vfs_write+0x161/0x5d0 [ 1408.754627][T23880] __x64_sys_sendfile64+0x1cc/0x210 [ 1408.754640][T23880] ? ksys_write+0x1a5/0x250 20:56:56 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x45}}}}}}}, 0x0) [ 1408.754654][T23880] ? __ia32_sys_sendfile+0x220/0x220 [ 1408.754676][T23880] ? __ia32_sys_clock_settime+0x260/0x260 [ 1408.763101][T23884] bridge6: port 1(bond0) entered disabled state [ 1408.764170][T23880] ? trace_hardirqs_off_caller+0x55/0x230 [ 1408.764197][T23880] do_syscall_64+0xf6/0x7d0 [ 1408.764225][T23880] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1408.778908][T23884] device bond0 entered promiscuous mode [ 1408.780411][T23880] RIP: 0033:0x45c829 [ 1408.780437][T23880] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1408.780445][T23880] RSP: 002b:00007f6dd397bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1408.799521][T23884] device bond_slave_0 entered promiscuous mode [ 1408.800228][T23880] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 [ 1408.815636][T23884] device bond_slave_1 entered promiscuous mode [ 1408.820962][T23880] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1408.820971][T23880] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1408.820980][T23880] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000006 [ 1408.820990][T23880] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f6dd397c6d4 20:56:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:56:57 executing program 3 (fault-call:6 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3}}}}}}}, 0x0) [ 1409.105246][T23893] device bond0 left promiscuous mode [ 1409.110717][T23893] device bond_slave_0 left promiscuous mode [ 1409.127403][T23893] device bond_slave_1 left promiscuous mode [ 1409.147509][T23893] bridge6: port 1(bond0) entered disabled state 20:56:57 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x5}}}}}}}, 0x0) [ 1409.292750][ T27] audit: type=1804 audit(1589144217.326:1816): pid=23910 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1264/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1409.317671][T23891] device bond0 left promiscuous mode [ 1409.329107][T23910] FAULT_INJECTION: forcing a failure. [ 1409.329107][T23910] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.343294][T23891] device bond_slave_0 left promiscuous mode [ 1409.373784][T23891] device bond_slave_1 left promiscuous mode [ 1409.395366][T23910] CPU: 0 PID: 23910 Comm: syz-executor.3 Not tainted 5.7.0-rc4-syzkaller #0 [ 1409.404067][T23910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.414127][T23910] Call Trace: [ 1409.417442][T23910] dump_stack+0x188/0x20d [ 1409.421793][T23910] should_fail.cold+0x5/0xa [ 1409.426308][T23910] ? lock_downgrade+0x840/0x840 [ 1409.435168][T23910] ? fault_create_debugfs_attr+0x140/0x140 [ 1409.440996][T23910] should_failslab+0x5/0xf [ 1409.445423][T23910] __kmalloc+0x2d9/0x7a0 [ 1409.449670][T23910] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1409.455217][T23910] ? alloc_pipe_info+0x1e0/0x4f0 [ 1409.460153][T23910] ? aa_file_perm+0x5be/0x14d0 [ 1409.464928][T23910] ? __lock_acquire+0xcbb/0x4c50 [ 1409.469875][T23910] alloc_pipe_info+0x1e0/0x4f0 [ 1409.474645][T23910] splice_direct_to_actor+0x777/0x980 [ 1409.480032][T23910] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1409.485580][T23910] ? do_splice_to+0x160/0x160 [ 1409.490270][T23910] do_splice_direct+0x1b4/0x280 [ 1409.495121][T23910] ? splice_direct_to_actor+0x980/0x980 [ 1409.500680][T23910] do_sendfile+0x555/0xc50 [ 1409.505106][T23910] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1409.510396][T23910] ? wait_for_completion+0x270/0x270 [ 1409.515676][T23910] ? __sb_end_write+0x101/0x1d0 [ 1409.520523][T23910] ? vfs_write+0x161/0x5d0 [ 1409.524948][T23910] __x64_sys_sendfile64+0x1cc/0x210 [ 1409.530141][T23910] ? ksys_write+0x1a5/0x250 [ 1409.534645][T23910] ? __ia32_sys_sendfile+0x220/0x220 [ 1409.539928][T23910] ? __ia32_sys_clock_settime+0x260/0x260 [ 1409.545648][T23910] ? trace_hardirqs_off_caller+0x55/0x230 [ 1409.551375][T23910] do_syscall_64+0xf6/0x7d0 [ 1409.555891][T23910] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1409.561786][T23910] RIP: 0033:0x45c829 [ 1409.565683][T23910] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1409.568312][T23891] bridge219: port 1(bond0) entered disabled state [ 1409.585282][T23910] RSP: 002b:00007f6dd397bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1409.585297][T23910] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 [ 1409.585304][T23910] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1409.585313][T23910] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1409.585322][T23910] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000006 [ 1409.585330][T23910] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f6dd397c6d4 [ 1409.806558][T23881] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1410.144454][T23911] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1410.171123][T23875] bridge219: port 1(bond0) entered blocking state [ 1410.186108][T23875] bridge219: port 1(bond0) entered disabled state [ 1410.204988][T23875] device bond0 entered promiscuous mode [ 1410.211386][T23875] device bond_slave_0 entered promiscuous mode [ 1410.224227][T23875] device bond_slave_1 entered promiscuous mode [ 1410.240971][T23882] device bond0 left promiscuous mode [ 1410.250505][T23882] device bond_slave_0 left promiscuous mode [ 1410.266547][T23882] device bond_slave_1 left promiscuous mode [ 1410.278663][T23882] bridge219: port 1(bond0) entered disabled state [ 1410.404974][T23892] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:56:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:56:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6}}}}}}}, 0x0) 20:56:58 executing program 3 (fault-call:6 fault-nth:2): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket(0x0, 0x80802, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) sendto$llc(r2, &(0x7f0000000000)="2e1ed264a719b15f8bc4defe95df87", 0xf, 0x4000000, 0x0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000070601040000000000000000000000000bb9a53c53450500010007000000"], 0x87a434fef1a37449}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0xff, 0x2}) 20:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00'}, 0x30) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000240)=0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r5, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r5, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r4, r5, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r6}, 0x30) ioctl$sock_bt_hci(r5, 0x400448df, &(0x7f0000000480)="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") sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000e3ff22c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9791fa6000000000000", @ANYRES32=0x0, @ANYBLOB="00000079953f932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x1c, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x80000001}}]}]}]}, 0x3c}}, 0x0) 20:56:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x48}}, 0x20}}, 0x0) [ 1410.681184][T23951] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:56:58 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x7}}}}}}}, 0x0) [ 1410.777969][ T27] audit: type=1804 audit(1589144218.816:1817): pid=23955 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1265/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1410.794029][T23957] bridge219: port 1(bond0) entered blocking state [ 1410.807299][T23955] FAULT_INJECTION: forcing a failure. [ 1410.807299][T23955] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.846670][T23957] bridge219: port 1(bond0) entered disabled state [ 1410.888746][T23955] CPU: 1 PID: 23955 Comm: syz-executor.3 Not tainted 5.7.0-rc4-syzkaller #0 [ 1410.895562][T23957] device bond0 entered promiscuous mode [ 1410.897448][T23955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.897456][T23955] Call Trace: [ 1410.897481][T23955] dump_stack+0x188/0x20d [ 1410.897507][T23955] should_fail.cold+0x5/0xa [ 1410.897527][T23955] ? fault_create_debugfs_attr+0x140/0x140 [ 1410.897551][T23955] should_failslab+0x5/0xf [ 1410.932467][T23957] device bond_slave_0 entered promiscuous mode [ 1410.935929][T23955] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 1410.935962][T23955] iomap_dio_rw+0x27f/0x1140 [ 1410.935985][T23955] ? lock_release+0x800/0x800 [ 1410.936008][T23955] ? iomap_dio_complete+0x770/0x770 [ 1410.936031][T23955] ? down_read+0x110/0x420 [ 1410.966518][T23955] ? down_read_killable+0x460/0x460 [ 1410.971845][T23955] ? ext4_file_read_iter+0x444/0x600 [ 1410.977146][T23955] ext4_file_read_iter+0x444/0x600 [ 1410.982358][T23955] generic_file_splice_read+0x479/0x780 [ 1410.987037][ T27] audit: type=1804 audit(1589144218.856:1818): pid=23960 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/937/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1410.987906][T23955] ? add_to_pipe+0x3a0/0x3a0 [ 1410.987938][T23955] ? add_to_pipe+0x3a0/0x3a0 [ 1411.021543][T23955] do_splice_to+0x114/0x160 [ 1411.026061][T23955] splice_direct_to_actor+0x307/0x980 [ 1411.031722][T23955] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1411.036056][T23957] device bond_slave_1 entered promiscuous mode [ 1411.037289][T23955] ? do_splice_to+0x160/0x160 [ 1411.037318][T23955] do_splice_direct+0x1b4/0x280 [ 1411.037334][T23955] ? splice_direct_to_actor+0x980/0x980 [ 1411.037365][T23955] do_sendfile+0x555/0xc50 [ 1411.063065][T23955] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1411.068370][T23955] ? wait_for_completion+0x270/0x270 [ 1411.073670][T23955] ? __sb_end_write+0x101/0x1d0 [ 1411.078537][T23955] ? vfs_write+0x161/0x5d0 [ 1411.083095][T23955] __x64_sys_sendfile64+0x1cc/0x210 [ 1411.088301][T23955] ? ksys_write+0x1a5/0x250 [ 1411.092816][T23955] ? __ia32_sys_sendfile+0x220/0x220 [ 1411.098109][T23955] ? __ia32_sys_clock_settime+0x260/0x260 [ 1411.103940][T23955] ? trace_hardirqs_off_caller+0x55/0x230 [ 1411.109677][T23955] do_syscall_64+0xf6/0x7d0 [ 1411.114195][T23955] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1411.120110][T23955] RIP: 0033:0x45c829 20:56:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x8}}}}}}}, 0x0) [ 1411.124010][T23955] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1411.143616][T23955] RSP: 002b:00007f6dd397bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1411.152037][T23955] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 [ 1411.160013][T23955] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1411.167988][T23955] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1411.175995][T23955] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000006 [ 1411.183967][T23955] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f6dd397c6d4 [ 1411.187043][T23965] device bond0 left promiscuous mode [ 1411.213714][T23965] device bond_slave_0 left promiscuous mode [ 1411.238087][T23965] device bond_slave_1 left promiscuous mode [ 1411.270792][T23965] bridge219: port 1(bond0) entered disabled state 20:56:59 executing program 3 (fault-call:6 fault-nth:3): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:56:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x31}}}}}}}, 0x0) 20:56:59 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x7f}, 0x4) 20:56:59 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3d}}}}}}}, 0x0) [ 1411.649209][ T27] audit: type=1804 audit(1589144219.686:1819): pid=23991 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1266/cgroup.controllers" dev="sda1" ino=16220 res=1 [ 1411.659432][T23991] FAULT_INJECTION: forcing a failure. [ 1411.659432][T23991] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.778077][T23991] CPU: 0 PID: 23991 Comm: syz-executor.3 Not tainted 5.7.0-rc4-syzkaller #0 [ 1411.786780][T23991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.796839][T23991] Call Trace: [ 1411.800139][T23991] dump_stack+0x188/0x20d [ 1411.804482][T23991] should_fail.cold+0x5/0xa [ 1411.808990][T23991] ? fault_create_debugfs_attr+0x140/0x140 [ 1411.814828][T23991] should_failslab+0x5/0xf [ 1411.819249][T23991] kmem_cache_alloc+0x29b/0x740 [ 1411.824109][T23991] ? ext4_ext_index_trans_blocks+0x12f/0x160 [ 1411.830178][T23991] ext4_init_io_end+0x23/0x170 [ 1411.834949][T23991] ext4_writepages+0x928/0x31d0 [ 1411.839808][T23991] ? mark_lock+0x12b/0xf10 [ 1411.844278][T23991] ? is_bpf_text_address+0xcb/0x160 [ 1411.849618][T23991] ? __kernel_text_address+0x9/0x30 [ 1411.854997][T23991] ? unwind_get_return_address+0x5a/0xa0 [ 1411.860650][T23991] ? ext4_mark_inode_dirty+0x900/0x900 [ 1411.866180][T23991] ? swiotlb_tbl_unmap_single+0x102/0x340 [ 1411.871914][T23991] ? mark_held_locks+0xe0/0xe0 [ 1411.876682][T23991] ? save_stack+0x32/0x40 [ 1411.881009][T23991] ? save_stack+0x1a/0x40 [ 1411.885348][T23991] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1411.891158][T23991] ? kmem_cache_alloc_trace+0x153/0x7d0 [ 1411.896718][T23991] ? iomap_dio_rw+0x27f/0x1140 [ 1411.901504][T23991] ? ext4_mark_inode_dirty+0x900/0x900 [ 1411.907029][T23991] ? do_writepages+0xfa/0x2a0 [ 1411.911712][T23991] do_writepages+0xfa/0x2a0 [ 1411.916238][T23991] ? page_writeback_cpu_online+0x10/0x10 [ 1411.921882][T23991] ? do_raw_spin_lock+0x129/0x2e0 [ 1411.926917][T23991] ? do_raw_spin_unlock+0x171/0x260 [ 1411.932215][T23991] ? _raw_spin_unlock+0x24/0x40 [ 1411.937155][T23991] ? wbc_attach_and_unlock_inode+0x60a/0x9c0 [ 1411.943299][T23991] __filemap_fdatawrite_range+0x2aa/0x390 [ 1411.949202][T23991] ? delete_from_page_cache_batch+0xec0/0xec0 [ 1411.955272][T23991] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 1411.960811][T23991] filemap_write_and_wait_range+0xf7/0x1e0 [ 1411.966613][T23991] iomap_dio_rw+0x623/0x1140 [ 1411.971328][T23991] ? iomap_dio_complete+0x770/0x770 [ 1411.976518][T23991] ? down_read+0x110/0x420 [ 1411.980933][T23991] ? down_read_killable+0x460/0x460 [ 1411.986231][T23991] ? ext4_file_read_iter+0x444/0x600 [ 1411.991674][T23991] ext4_file_read_iter+0x444/0x600 [ 1411.997005][T23991] generic_file_splice_read+0x479/0x780 [ 1412.002707][T23991] ? add_to_pipe+0x3a0/0x3a0 [ 1412.007299][T23991] ? add_to_pipe+0x3a0/0x3a0 [ 1412.011870][T23991] do_splice_to+0x114/0x160 [ 1412.016546][T23991] splice_direct_to_actor+0x307/0x980 [ 1412.021917][T23991] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1412.027445][T23991] ? do_splice_to+0x160/0x160 [ 1412.032232][T23991] do_splice_direct+0x1b4/0x280 [ 1412.037308][T23991] ? splice_direct_to_actor+0x980/0x980 [ 1412.042992][T23991] do_sendfile+0x555/0xc50 [ 1412.047449][T23991] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1412.052719][T23991] ? wait_for_completion+0x270/0x270 [ 1412.058217][T23991] ? __sb_end_write+0x101/0x1d0 [ 1412.063233][T23991] ? vfs_write+0x161/0x5d0 [ 1412.067847][T23991] __x64_sys_sendfile64+0x1cc/0x210 [ 1412.073145][T23991] ? ksys_write+0x1a5/0x250 [ 1412.077650][T23991] ? __ia32_sys_sendfile+0x220/0x220 [ 1412.082927][T23991] ? __ia32_sys_clock_settime+0x260/0x260 [ 1412.088633][T23991] ? trace_hardirqs_off_caller+0x55/0x230 [ 1412.094349][T23991] do_syscall_64+0xf6/0x7d0 [ 1412.098957][T23991] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1412.105024][T23991] RIP: 0033:0x45c829 [ 1412.108923][T23991] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1412.128859][T23991] RSP: 002b:00007f6dd397bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1412.137546][T23991] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 [ 1412.145525][T23991] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1412.153696][T23991] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1412.162137][T23991] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000006 [ 1412.170204][T23991] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f6dd397c6d4 [ 1412.269020][T23982] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1412.290183][T23957] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1412.314233][T23951] bridge219: port 1(bond0) entered blocking state [ 1412.320713][T23951] bridge219: port 1(bond0) entered disabled state [ 1412.329056][T23951] device bond0 entered promiscuous mode [ 1412.335801][T23951] device bond_slave_0 entered promiscuous mode [ 1412.342415][T23951] device bond_slave_1 entered promiscuous mode [ 1412.351298][T23990] device bond0 left promiscuous mode [ 1412.356951][T23990] device bond_slave_0 left promiscuous mode [ 1412.363203][T23990] device bond_slave_1 left promiscuous mode [ 1412.369404][T23990] bridge219: port 1(bond0) entered disabled state 20:57:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:00 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x60}}}}}}}, 0x0) 20:57:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:57:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000005ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl(r1, 0x1, &(0x7f0000000000)="c1c4155fbc43fef22ec93df923dcc3ba99d295d87f4728ac37d5df87cbef9f4504301194a4048b975d4b8b8c11db57bcfe9289b963a59dee25c7c8") 20:57:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r2, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x4, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x24008000) syz_emit_ethernet(0x52, &(0x7f00000000c0)={@link_local, @random="68374a3541df", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\b\x00', 0x1c, 0x3c, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[@hopopts], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:57:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4c}}, 0x20}}, 0x0) 20:57:00 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6d}}}}}}}, 0x0) [ 1412.705345][ T27] audit: type=1804 audit(1589144220.746:1820): pid=24030 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1267/cgroup.controllers" dev="sda1" ino=16278 res=1 20:57:00 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x300}}}}}}}, 0x0) 20:57:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3e8}}}}}}}, 0x0) 20:57:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000003) 20:57:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x500}}}}}}}, 0x0) 20:57:01 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x600}}}}}}}, 0x0) [ 1413.277163][ T27] audit: type=1804 audit(1589144221.316:1821): pid=24059 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1268/cgroup.controllers" dev="sda1" ino=16283 res=1 [ 1413.402224][T24034] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1413.454282][T24043] bridge219: port 1(bond0) entered blocking state [ 1413.460764][T24043] bridge219: port 1(bond0) entered disabled state [ 1413.487398][T24043] device bond0 entered promiscuous mode [ 1413.520379][T24043] device bond_slave_0 entered promiscuous mode [ 1413.537800][T24043] device bond_slave_1 entered promiscuous mode [ 1413.560668][T24044] device bond0 left promiscuous mode [ 1413.566228][T24044] device bond_slave_0 left promiscuous mode [ 1413.591851][T24044] device bond_slave_1 left promiscuous mode [ 1413.642731][T24044] bridge219: port 1(bond0) entered disabled state [ 1413.806522][T24067] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1413.857405][T24034] bridge219: port 1(bond0) entered blocking state [ 1413.873358][T24034] bridge219: port 1(bond0) entered disabled state [ 1413.908129][T24034] device bond0 entered promiscuous mode [ 1413.920721][T24034] device bond_slave_0 entered promiscuous mode [ 1413.937154][T24034] device bond_slave_1 entered promiscuous mode [ 1413.956972][T24043] device bond0 left promiscuous mode [ 1413.963321][T24043] device bond_slave_0 left promiscuous mode [ 1413.969398][T24043] device bond_slave_1 left promiscuous mode [ 1414.006471][T24043] bridge219: port 1(bond0) entered disabled state 20:57:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x700}}}}}}}, 0x0) 20:57:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000004) 20:57:02 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'wg1\x00', {0x3}, 0x7}) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[@ANYRESOCT=r2, @ANYRES32=r4, @ANYRESDEC=r4], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000700)={0x68, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}]}, 0x68}, 0x1, 0x0, 0x0, 0x48010}, 0x4000000) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000380)=""/109, &(0x7f0000000440)=0x6d) unshare(0x40000000) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "e2e1dddd0a95e5f1", "3904498ee3f63315bedd66f842e7340e", "646dd185", "a863d3147619d877"}, 0x28) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@ipv4_newaddr={0x28, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x200}]}, 0x28}}, 0x0) 20:57:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x60}}, 0x20}}, 0x0) 20:57:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3100}}}}}}}, 0x0) [ 1414.589522][T24092] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1414.620604][T24091] IPVS: ftp: loaded support on port[0] = 21 [ 1414.630082][ T27] audit: type=1804 audit(1589144222.666:1822): pid=24098 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1269/cgroup.controllers" dev="sda1" ino=16327 res=1 [ 1414.654378][T24099] bridge219: port 1(bond0) entered blocking state [ 1414.660934][T24099] bridge219: port 1(bond0) entered disabled state [ 1414.699321][T24099] device bond0 entered promiscuous mode [ 1414.725115][T24099] device bond_slave_0 entered promiscuous mode 20:57:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3d00}}}}}}}, 0x0) [ 1414.757011][T24099] device bond_slave_1 entered promiscuous mode [ 1414.817571][T24106] device bond0 left promiscuous mode [ 1414.823335][T24106] device bond_slave_0 left promiscuous mode 20:57:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000005) 20:57:02 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3f00}}}}}}}, 0x0) [ 1414.864547][T24106] device bond_slave_1 left promiscuous mode [ 1414.896132][T24106] bridge219: port 1(bond0) entered disabled state [ 1415.019108][ T27] audit: type=1804 audit(1589144223.056:1823): pid=24112 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1270/cgroup.controllers" dev="sda1" ino=16005 res=1 20:57:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x4000}}}}}}}, 0x0) 20:57:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6000}}}}}}}, 0x0) 20:57:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000008) [ 1415.397507][T24124] IPVS: ftp: loaded support on port[0] = 21 [ 1415.541031][ T27] audit: type=1804 audit(1589144223.576:1824): pid=24130 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1271/cgroup.controllers" dev="sda1" ino=16313 res=1 [ 1415.636861][T24099] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:03 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6d00}}}}}}}, 0x0) 20:57:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x68}}, 0x20}}, 0x0) [ 1415.986241][T24149] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1416.048961][T24151] bridge220: port 1(bond0) entered blocking state [ 1416.082049][T24151] bridge220: port 1(bond0) entered disabled state [ 1416.103327][T24151] device bond0 entered promiscuous mode [ 1416.108912][T24151] device bond_slave_0 entered promiscuous mode [ 1416.159777][T24151] device bond_slave_1 entered promiscuous mode [ 1416.183972][T24154] device bond0 left promiscuous mode [ 1416.189580][T24154] device bond_slave_0 left promiscuous mode [ 1416.221253][T24154] device bond_slave_1 left promiscuous mode [ 1416.249719][T24154] bridge220: port 1(bond0) entered disabled state [ 1417.021577][T24151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1417.047723][T24149] bridge220: port 1(bond0) entered blocking state [ 1417.062592][T24149] bridge220: port 1(bond0) entered disabled state [ 1417.070778][T24149] device bond0 entered promiscuous mode [ 1417.085301][T24149] device bond_slave_0 entered promiscuous mode [ 1417.102362][T24149] device bond_slave_1 entered promiscuous mode [ 1417.119928][T24167] device bond0 left promiscuous mode [ 1417.126858][T24167] device bond_slave_0 left promiscuous mode [ 1417.141183][T24167] device bond_slave_1 left promiscuous mode [ 1417.151519][T24167] bridge220: port 1(bond0) entered disabled state 20:57:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000003) 20:57:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000009) 20:57:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xe803}}}}}}}, 0x0) 20:57:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x5) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@ipv4_getaddr={0x48, 0x16, 0x800, 0x70bd2a, 0x25dfdbfb, {0x2, 0x0, 0x28, 0xc8}, [@IFA_LABEL={0x14, 0x3, 'veth0_to_bridge\x00'}, @IFA_LABEL={0x14, 0x3, 'veth1_vlan\x00'}, @IFA_ADDRESS={0x8, 0x1, @loopback}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x81) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x19c, r5, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x8c, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x27131b42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x658a6f40}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26d0914f}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a313d4a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4729b635}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41a6783b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x90}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x9c, 0x8, 0x0, 0x1, [{0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b71cd67}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64faabae}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x115b67ef}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a79037a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d0d4524}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e347aa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbd361cd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x32902f04}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1c07ce90}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f0adfb9}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x3}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x20048051}, 0x4000) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x2c, 0x31, 0x727, 0x0, 0x0, {}, [{0x18, 0x1, [@m_ct={0x14, 0x1, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x4}, {0x4}}}]}]}, 0x2c}}, 0x0) 20:57:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6c}}, 0x20}}, 0x0) 20:57:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1418.729269][T24189] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:06 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x1000000}}}}}}}, 0x0) [ 1418.767114][ T27] audit: type=1804 audit(1589144226.807:1825): pid=24188 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1272/cgroup.controllers" dev="sda1" ino=15970 res=1 [ 1418.782933][T24189] bridge220: port 1(bond0) entered blocking state [ 1418.878736][T24189] bridge220: port 1(bond0) entered disabled state [ 1418.898412][ T27] audit: type=1804 audit(1589144226.937:1826): pid=24195 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1416/cgroup.controllers" dev="sda1" ino=16049 res=1 [ 1418.921957][T24189] device bond0 entered promiscuous mode [ 1418.945425][T24189] device bond_slave_0 entered promiscuous mode 20:57:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3000000}}}}}}}, 0x0) [ 1418.985940][T24189] device bond_slave_1 entered promiscuous mode 20:57:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000000d) 20:57:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x5000000}}}}}}}, 0x0) [ 1419.253525][ T27] audit: type=1804 audit(1589144227.297:1827): pid=24215 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1273/cgroup.controllers" dev="sda1" ino=15746 res=1 20:57:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6000000}}}}}}}, 0x0) 20:57:07 executing program 0: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x5000000}}}}}}}, 0x0) 20:57:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x7000000}}}}}}}, 0x0) 20:57:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in=@loopback, 0x4e23, 0x0, 0x4e20, 0x0, 0x2, 0x0, 0x80}, {0xc0000000000, 0x0, 0x8, 0x100000000000003, 0x0, 0x6, 0x1f}, {0x0, 0xffffffffffffff84, 0xbd07, 0x100000001}, 0x5, 0x0, 0x0, 0x0, 0x1}, {{@in6=@private1={0xfc, 0x1, [], 0x1}, 0x4d5}, 0xa, @in6=@rand_addr=' \x01\x00', 0x0, 0x3, 0x0, 0x5}}, 0xe8) sendfile(r3, r2, 0x0, 0x100000001) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000100)={0x1, 0x2, 0x1000, 0x11, &(0x7f0000000040)="b8840d082d15d27f9e1ce498dcb49efe3a", 0xea, 0x0, &(0x7f0000000300)="5bda25667b4ad9dae13b79d1195b0bad6418bb1e7c17fb03f3825ca307838cf5bd0ac28a50181ea51c0abb2899fc17cc93e57b5ebd0b45fa4ea3e3edbec8d3d4213e81c1630493ed449f82a7c9565249ef34d4a69d669d74d62fd44d5b2d719076b88652243e6bf8fddfc8e7f1823340627fb1e68e7299d367b2c35e00fde1c2c7aa451c1561e45796c23b05ca7cc0caf954113ec228b316ff6ff31acd6e08ac0700f1aaa3ccd929607fafa71b4ecdc58fa3c4440e0100ab25c279ceb4cc3595977b822c1b308336037c8506b4cac7a8174e33b3e5e82f174e06ac2722138d5b6cf557e5d21a78bb4842"}) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r6, 0x0, 0x100000001) 20:57:07 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x8000000}}}}}}}, 0x0) [ 1419.821990][T24202] device bond0 left promiscuous mode [ 1419.827312][T24202] device bond_slave_0 left promiscuous mode [ 1419.851839][T24202] device bond_slave_1 left promiscuous mode [ 1419.858249][T24202] bridge220: port 1(bond0) entered disabled state [ 1419.870029][ T27] audit: type=1804 audit(1589144227.907:1828): pid=24236 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1418/cgroup.controllers" dev="sda1" ino=15746 res=1 [ 1419.924500][ T27] audit: type=1804 audit(1589144227.967:1829): pid=24239 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1418/cgroup.controllers" dev="sda1" ino=15746 res=1 [ 1419.968433][ T27] audit: type=1804 audit(1589144227.997:1830): pid=24239 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1418/cgroup.controllers" dev="sda1" ino=15746 res=1 20:57:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000000fcce100001000c000100080001006e617400"/38], 0x24}}, 0x0) [ 1420.068687][T24224] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1420.099659][T24189] bridge220: port 1(bond0) entered blocking state [ 1420.120471][T24189] bridge220: port 1(bond0) entered disabled state [ 1420.149855][T24189] device bond0 entered promiscuous mode [ 1420.186913][T24189] device bond_slave_0 entered promiscuous mode [ 1420.200265][T24189] device bond_slave_1 entered promiscuous mode [ 1420.230607][T24228] device bond0 left promiscuous mode [ 1420.245755][T24228] device bond_slave_0 left promiscuous mode [ 1420.263769][T24228] device bond_slave_1 left promiscuous mode [ 1420.270283][T24228] bridge220: port 1(bond0) entered disabled state 20:57:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x74}}, 0x20}}, 0x0) [ 1420.585709][T24262] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1420.610544][T24262] bridge220: port 1(bond0) entered blocking state [ 1420.617164][T24262] bridge220: port 1(bond0) entered disabled state [ 1420.625854][T24262] device bond0 entered promiscuous mode [ 1420.631412][T24262] device bond_slave_0 entered promiscuous mode [ 1420.638561][T24262] device bond_slave_1 entered promiscuous mode [ 1420.649687][T24262] device bond0 left promiscuous mode [ 1420.655669][T24262] device bond_slave_0 left promiscuous mode [ 1420.663056][T24262] device bond_slave_1 left promiscuous mode [ 1420.669570][T24262] bridge220: port 1(bond0) entered disabled state 20:57:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000000f) 20:57:08 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x31000000}}}}}}}, 0x0) 20:57:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c00810ee00f80ecdb4cb9e307f029a00d0000002f000afb0a00020003000f0000000f00070005000600", 0x2e}], 0x1, 0x0, 0x0, 0x2000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018b370d2000000000000006400000064000000060000000600000009000006040000000800000006000000010000000100000004002a09911600000005000000020000000e0000000400000003000000090000000600000004000000010000000000000801000000000000010000000047006205005f30aaa9a5d4fe2c2ede991ff23994162350b2b6a0b633a3594ddee1dfef2bf3618281d13ff9baef"], &(0x7f00000001c0)=""/122, 0x82, 0x7a}, 0x20) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000780)=0xff, 0x2) select(0x40, &(0x7f0000000240)={0x1ff, 0x5, 0x5, 0x10000, 0x100, 0x1, 0x896, 0x9}, &(0x7f0000000280)={0x285e, 0x8, 0xee, 0xfffffffffffffffa, 0xfffffffffffffff9, 0xb0b3, 0x8, 0x7}, &(0x7f00000002c0)={0xcf9, 0x101, 0x7, 0x8000, 0x0, 0x10000, 0x2, 0x3}, &(0x7f0000000300)={0x77359400}) socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000740)={0x1, 'lo\x00', {}, 0xffc0}) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r5, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendto(r5, &(0x7f0000000340)="675c47c43f333116f56fa2f4f14a04c9b53bb6fd49a09d5fb899600411a8ff1ccabce4f59f9ab3f58b7736537eb77da2f5367cb795ae97db153f476113c668600530d1a1ec7798475b44d84ebd894b75", 0x50, 0x4000000, &(0x7f00000003c0)=@can, 0x80) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32, @ANYBLOB="08000300e00000015b3621eb78343f00000000000000b6c1a0f462c783135dfc19288a04e1c98d1f7796b89416de776283036c8be5a2f7ed649829c6d022908846786174cde9efb8f17e4e8162d5ef4b23106718c61e0da3ca9dcd16d2c2e84e5cf525fa8e4920ad78cf9895175ebc4bb8ba5133b205b036ebaa4ae4d75bdf79bae5e20fedf89a32e93b79f44f6f57485319886d3ad8086e4b30de3227f198ecba714579c8af5e8411458f190bf35b8816571b4fddcff3"], 0x40}}, 0x0) 20:57:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000180), 0x214, 0x0, 0x0, 0x31b) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x2}, 0x369) sendmmsg$alg(r2, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x0, 0x20}, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000200)={0x8000, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x108) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x411, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 1420.901208][T24276] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3d000000}}}}}}}, 0x0) [ 1420.938483][ T27] audit: type=1804 audit(1589144228.977:1831): pid=24271 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1274/cgroup.controllers" dev="sda1" ino=15955 res=1 [ 1420.976726][T24276] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x3f000000}}}}}}}, 0x0) [ 1421.156519][T24289] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1421.188403][T24262] bridge220: port 1(bond0) entered blocking state [ 1421.196584][T24262] bridge220: port 1(bond0) entered disabled state 20:57:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000010) 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x40000000}}}}}}}, 0x0) [ 1421.205095][T24262] device bond0 entered promiscuous mode [ 1421.213004][T24262] device bond_slave_0 entered promiscuous mode [ 1421.242842][T24262] device bond_slave_1 entered promiscuous mode [ 1421.269622][T24310] device bond0 left promiscuous mode [ 1421.275410][T24310] device bond_slave_0 left promiscuous mode [ 1421.289508][T24310] device bond_slave_1 left promiscuous mode [ 1421.304427][T24310] bridge220: port 1(bond0) entered disabled state 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x60000000}}}}}}}, 0x0) [ 1421.330996][ T27] audit: type=1804 audit(1589144229.367:1832): pid=24333 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1275/cgroup.controllers" dev="sda1" ino=15939 res=1 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x6d000000}}}}}}}, 0x0) [ 1421.465545][T24276] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1421.490081][T24276] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT 20:57:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x7a}}, 0x20}}, 0x0) 20:57:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:09 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0x8dffffff}}}}}}}, 0x0) 20:57:09 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8100635b36ddd74531032c05fcbc2947aed2ac30ffa106fdaaad6749457dd8cf8d825932c343adc319df0649d01cf4ad1b4233a3da43e64107141be6ee1274607afe4702943bdd3649c32f050386be563cee95f5a6492281f5d4d13adfa5f49316c49db235e29189ccb682407e27191a4d76217accc2c06389f4614acf13a100e2dec4e67fd8a1eefd73554bf5ab7682e5b09213f758e5143cbd88b8e79a083c26ade9"], 0xa0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) pipe(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x58, 0x0, 0x8e6767b8eef245b5, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="89ea4f762d3697285b314d87994b6cacb8d4784072c25ad776cac74245f2cf2ff99e12ab59aae9f3cdfb7602a586272277e4cc5743fee057fe2a5432b3836f9e7917af3c1a56e75c420f5052f6cf8bbe95117c1eca2a62f5397f5e7a8700000000000000d001257d05a90426b3ddac75fa07", @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 20:57:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000000be) 20:57:09 executing program 0: r0 = socket(0x9, 0x6, 0x0) getpeername$netlink(r0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@nested={0x34}]}, 0x48}}, 0x0) r3 = socket(0x9, 0x6, 0x7) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x191) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x800) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000125bd3000fedb8a2503000000080002000200000008000200020000000807000000000000010000000800010002000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000010000507000000000000510000000000", @ANYRES32, @ANYBLOB="0000000000000000140012000c000100766574680000c6bfeb21e2e24ee4a8716ee4"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32, @ANYBLOB], 0x44}}, 0x0) socket(0x10, 0x80002, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x200408a5) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$alg(0x26, 0x5, 0x0) [ 1421.920998][ T27] audit: type=1804 audit(1589144229.957:1833): pid=24390 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/943/memory.events" dev="sda1" ino=16001 res=1 [ 1421.968179][T24395] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xe8030000}}}}}}}, 0x0) [ 1422.052033][ T27] audit: type=1800 audit(1589144229.997:1834): pid=24390 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16001 res=0 [ 1422.057381][T24399] bridge220: port 1(bond0) entered blocking state [ 1422.092711][T24401] IPVS: ftp: loaded support on port[0] = 21 [ 1422.178733][T24399] bridge220: port 1(bond0) entered disabled state 20:57:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xf5ffffff}}}}}}}, 0x0) [ 1422.236726][T24399] device bond0 entered promiscuous mode [ 1422.272928][T24399] device bond_slave_0 entered promiscuous mode [ 1422.307815][T24399] device bond_slave_1 entered promiscuous mode 20:57:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000000f0) [ 1422.374190][T24407] device bond0 left promiscuous mode [ 1422.379900][T24407] device bond_slave_0 left promiscuous mode [ 1422.391058][T24407] device bond_slave_1 left promiscuous mode 20:57:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xffffff8d}}}}}}}, 0x0) [ 1422.423702][T24407] bridge220: port 1(bond0) entered disabled state 20:57:10 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xfffffff5}}}}}}}, 0x0) 20:57:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000000be) [ 1423.007005][T24445] IPVS: ftp: loaded support on port[0] = 21 [ 1423.291255][T24401] netdevsim0 speed is unknown, defaulting to 1000 [ 1423.298319][T24410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1423.391975][T24399] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xf0}}, 0x20}}, 0x0) [ 1423.558046][T24464] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1423.617423][T24465] bridge221: port 1(bond0) entered blocking state [ 1423.626818][T24465] bridge221: port 1(bond0) entered disabled state [ 1423.657434][T24465] device bond0 entered promiscuous mode [ 1423.677442][T24465] device bond_slave_0 entered promiscuous mode [ 1423.699704][T24465] device bond_slave_1 entered promiscuous mode [ 1423.730503][T24464] device bond0 left promiscuous mode [ 1423.739904][T24464] device bond_slave_0 left promiscuous mode [ 1423.759686][T24464] device bond_slave_1 left promiscuous mode [ 1423.787547][T24464] bridge221: port 1(bond0) entered disabled state [ 1424.257177][T24465] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1424.531393][ T5301] tipc: TX() has been purged, node left! 20:57:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:12 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {}, {}, {0x8, 0x6558, 0xffffffff}}}}}}}, 0x0) 20:57:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1000001fe) 20:57:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000511d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) socket$tipc(0x1e, 0x5, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2004c004}, 0x41) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) [ 1424.690288][T24503] IPVS: ftp: loaded support on port[0] = 21 [ 1424.758781][T24503] netdevsim0 speed is unknown, defaulting to 1000 [ 1424.787589][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 1424.787604][ T27] audit: type=1804 audit(1589144232.827:1843): pid=24504 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1278/cgroup.controllers" dev="sda1" ino=16202 res=1 [ 1425.254086][T24505] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 1425.755304][T24503] IPVS: ftp: loaded support on port[0] = 21 [ 1425.802900][T24503] netdevsim0 speed is unknown, defaulting to 1000 [ 1425.823026][T24567] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 20:57:13 executing program 0: r0 = socket(0x9, 0x6, 0x0) getpeername$netlink(r0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@nested={0x34}]}, 0x48}}, 0x0) r3 = socket(0x9, 0x6, 0x7) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x191) sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x800) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000125bd3000fedb8a2503000000080002000200000008000200020000000807000000000000010000000800010002000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000010000507000000000000510000000000", @ANYRES32, @ANYBLOB="0000000000000000140012000c000100766574680000c6bfeb21e2e24ee4a8716ee4"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32, @ANYBLOB], 0x44}}, 0x0) socket(0x10, 0x80002, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x200408a5) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$alg(0x26, 0x5, 0x0) 20:57:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:13 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0xf2, &(0x7f0000000040)={@remote, @empty, @void, {@generic={0x11, "b4bb2812eca82f0ef2e02e91fa538bc9a4d3101f7171a56c3e292a27930f3e6a36c82cdbec44e83c2c1d2917cc381d46f1c420ea31ed56693db3ca75e784791d7bb0727868c5126fd4cd5abdb4e87edb03a319660c18d944eacd8063a3cca0ec3556d4192de2869ecb3d48aa00abaa6f066255296ef058ca131aec321e4fd452c6a9e7cb73f5b76ce1c843269ae4655128f78562ddb4c95e9ccd39fc44d9a2202673c7375aab181aa8e833e7213de0a879618f5cd550c2869093b1a87299356fea7956bf822092299fffc3d8c04b24be7f601ceead15bbee154202b47d5472e81d6df6f0"}}}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e23, @remote}}) 20:57:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000b35) 20:57:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x300}}, 0x20}}, 0x0) [ 1426.016523][T24587] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1426.083251][T24593] bridge222: port 1(bond0) entered blocking state [ 1426.089734][T24593] bridge222: port 1(bond0) entered disabled state [ 1426.106812][ T27] audit: type=1804 audit(1589144234.147:1844): pid=24588 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1279/cgroup.controllers" dev="sda1" ino=16162 res=1 [ 1426.144627][T24598] IPVS: ftp: loaded support on port[0] = 21 [ 1426.161866][T24593] device bond0 entered promiscuous mode [ 1426.188918][T24593] device bond_slave_0 entered promiscuous mode [ 1426.219350][T24593] device bond_slave_1 entered promiscuous mode [ 1426.274312][T24587] device bond0 left promiscuous mode [ 1426.282190][T24587] device bond_slave_0 left promiscuous mode [ 1426.308699][T24587] device bond_slave_1 left promiscuous mode [ 1426.338537][T24587] bridge222: port 1(bond0) entered disabled state 20:57:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100001800) [ 1426.697630][ T27] audit: type=1804 audit(1589144234.737:1845): pid=24607 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1280/cgroup.controllers" dev="sda1" ino=16315 res=1 20:57:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002000) [ 1427.252380][ T27] audit: type=1804 audit(1589144235.297:1846): pid=24616 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1281/cgroup.controllers" dev="sda1" ino=16162 res=1 20:57:15 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d000044a50b7b020000000000", @ANYRES32, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4000810) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006540)={'lo\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000003e84fe3b", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r6, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000006700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000066c0)={&(0x7f0000006580)={0x124, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x81}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x81}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x8}]}, 0x124}, 0x1, 0x0, 0x0, 0x881}, 0x0) [ 1427.295636][T24610] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1427.343691][T24593] bridge222: port 1(bond0) entered blocking state [ 1427.354767][T24593] bridge222: port 1(bond0) entered disabled state [ 1427.382804][T24593] device bond0 entered promiscuous mode [ 1427.389562][T24593] device bond_slave_0 entered promiscuous mode [ 1427.408909][T24593] device bond_slave_1 entered promiscuous mode [ 1427.440976][T24612] device bond0 left promiscuous mode [ 1427.446817][T24612] device bond_slave_0 left promiscuous mode [ 1427.467974][T24612] device bond_slave_1 left promiscuous mode [ 1427.475975][T24612] bridge222: port 1(bond0) entered disabled state 20:57:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100002800) [ 1427.613900][T24600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1427.759491][T24634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1427.804334][ T27] audit: type=1804 audit(1589144235.847:1847): pid=24642 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1282/cgroup.controllers" dev="sda1" ino=16162 res=1 [ 1427.853362][T24635] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 20:57:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x500}}, 0x20}}, 0x0) [ 1427.999786][T24635] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1428.028738][T24636] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1428.178241][T24676] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1428.239727][T24679] bridge222: port 1(bond0) entered blocking state [ 1428.250323][T24679] bridge222: port 1(bond0) entered disabled state [ 1428.279095][T24679] device bond0 entered promiscuous mode [ 1428.308004][T24679] device bond_slave_0 entered promiscuous mode [ 1428.329422][T24679] device bond_slave_1 entered promiscuous mode [ 1428.369397][T24682] device bond0 left promiscuous mode [ 1428.375542][T24682] device bond_slave_0 left promiscuous mode [ 1428.401895][T24682] device bond_slave_1 left promiscuous mode [ 1428.421789][T24682] bridge222: port 1(bond0) entered disabled state [ 1429.045040][T24679] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000b00010067726574617000001400020008000100", @ANYRES32=r3, @ANYBLOB="08000700ffffffff08000a00", @ANYRES32=r3], 0x4c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:57:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100003000) 20:57:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_emit_ethernet(0x7b, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYRESHEX=r1, @ANYRES32=r1, @ANYRESDEC=r4, @ANYRES16=r4], 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000000)=""/176, &(0x7f00000000c0)=0xb0) 20:57:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x600}}, 0x20}}, 0x0) 20:57:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)={0x4c, r1, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24}]}, 0x4c}}, 0x0) 20:57:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095cf21879f9cf7e9770d86dd60eaa83600452f00fe8000000000000000000000000000aafe8000000000000000000000000000aa242088be000100002200000800000086dd08000000080022eb000000002000000002000000000000000000000008055400655800"/127], 0x0) [ 1431.289171][T24732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1431.299223][ T21] tipc: TX() has been purged, node left! [ 1431.328362][T24732] bridge223: port 1(bond0) entered blocking state [ 1431.337504][ T27] audit: type=1804 audit(1589144239.378:1848): pid=24737 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1283/cgroup.controllers" dev="sda1" ino=16346 res=1 [ 1431.366869][T24732] bridge223: port 1(bond0) entered disabled state [ 1431.388430][T24732] device bond0 entered promiscuous mode 20:57:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100003800) [ 1431.411293][T24732] device bond_slave_0 entered promiscuous mode [ 1431.422770][ T27] audit: type=1800 audit(1589144239.408:1849): pid=24737 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=16346 res=0 [ 1431.445014][T24732] device bond_slave_1 entered promiscuous mode 20:57:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00fe8000000000000000000000000000aafe8000000000000000000000000000aa243b88be000100002200000800000086dd080088be00000000100000000100000000000000080022eb0000000020000000020037618236690c7b4dfa49ee59000000000000000000000800655800000000"], 0x0) [ 1431.485045][T24742] device bond0 left promiscuous mode [ 1431.490370][T24742] device bond_slave_0 left promiscuous mode [ 1431.504093][ T27] audit: type=1804 audit(1589144239.408:1850): pid=24733 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1283/cgroup.controllers" dev="sda1" ino=16346 res=1 [ 1431.533105][T24742] device bond_slave_1 left promiscuous mode [ 1431.547141][T24742] bridge223: port 1(bond0) entered disabled state [ 1431.573797][ T27] audit: type=1804 audit(1589144239.428:1851): pid=24737 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1283/cgroup.controllers" dev="sda1" ino=16346 res=1 20:57:19 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @private1={0xfc, 0x1, [], 0x1}, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1, {0xc4}}}, {}, {0x8, 0x6558, 0x800}}}}}}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0cbb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6f68ee841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r2}, 0x30) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r5, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r4, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r4, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="58075f5213f0f3be06f14bfa9e81bc49db5be39afa837014687721237a08af0e8b24893becd900e1ee6fbe3e9c7290d9c1cb203e7a857b924a8674ac97ecd4189cd511f3053a96105786dd7f7d5ba7f930d0aa08", 0x54}, {&(0x7f0000000100)="5694b39111119b9874dd4879c6c45ce3329cc0a4353ee1ee70b2debf088a3078e718e9eef7a989a14ead952721ba13a44c3b06c86518e50d79dda1383bd5f5fa6f0d68543b2874454abb93ca9bc77870610e077d40589ae42d774605cc59abe74a8e91ce4e19f24310a19b9b193876529de244e28b5ceaba675dd5320b3f9971210b251f0dc64f6f963ce596ff1420c35a79728197387bac3f21ea360d7a81ea428fd5924c262d41730ce471981842f7e7a157d3defd9af22b9a30", 0xbb}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00ab2302bb2505f21b7611208360eb3a000000ff030a0001004c0000010000", @ANYRES32, @ANYRES32=r7], 0x60, 0x4000050}, 0x20009080) [ 1431.673497][T24744] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1431.686177][ T27] audit: type=1804 audit(1589144239.728:1852): pid=24762 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1284/cgroup.controllers" dev="sda1" ino=16351 res=1 [ 1431.806759][T24748] bond6: (slave gretap1): Enslaving as a backup interface with an up link [ 1431.844442][T24756] bond6 (unregistering): (slave gretap1): Releasing backup interface 20:57:19 executing program 0: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0xe, &(0x7f0000000000)="02000000", 0x4) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000140)=ANY=[@ANYBLOB="fb18c3"], 0x1c, 0x0}, 0x0) 20:57:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100004000) [ 1432.200087][ T27] audit: type=1804 audit(1589144240.238:1853): pid=24814 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1285/cgroup.controllers" dev="sda1" ino=16334 res=1 [ 1432.206994][T24756] bond6 (unregistering): Released all slaves [ 1432.352003][T24813] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1432.416743][T24732] bridge223: port 1(bond0) entered blocking state [ 1432.433219][T24732] bridge223: port 1(bond0) entered disabled state [ 1432.466445][T24732] device bond0 entered promiscuous mode [ 1432.485560][T24732] device bond_slave_0 entered promiscuous mode [ 1432.521261][T24732] device bond_slave_1 entered promiscuous mode [ 1432.541219][T24815] device bond0 left promiscuous mode [ 1432.550157][T24815] device bond_slave_0 left promiscuous mode [ 1432.565853][T24815] device bond_slave_1 left promiscuous mode [ 1432.580324][T24815] bridge223: port 1(bond0) entered disabled state [ 1433.021818][T24744] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 20:57:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 20:57:21 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2}, 0x10, 0x0}, 0x0) 20:57:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100004800) 20:57:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x700}}, 0x20}}, 0x0) [ 1433.349584][ T27] audit: type=1804 audit(1589144241.388:1854): pid=24880 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1286/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 1433.545373][T24876] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1433.577219][T24879] bridge223: port 1(bond0) entered blocking state [ 1433.592521][T24879] bridge223: port 1(bond0) entered disabled state [ 1433.608577][T24879] device bond0 entered promiscuous mode [ 1433.615674][T24879] device bond_slave_0 entered promiscuous mode [ 1433.628939][T24879] device bond_slave_1 entered promiscuous mode [ 1433.639799][T24881] device bond0 left promiscuous mode [ 1433.647317][T24881] device bond_slave_0 left promiscuous mode [ 1433.654853][T24881] device bond_slave_1 left promiscuous mode [ 1433.663938][T24881] bridge223: port 1(bond0) entered disabled state 20:57:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:21 executing program 2: r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={r2, 0x1, 0x6}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0xa, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xff63, 0x10, 0x0, 0x0, r5}, 0x78) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r6, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYRES32=r6], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r5}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r7, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x0, 0x1d, 0x79, &(0x7f0000000000)="2792c69986aac59790d623ec438045466bf0e7234c25f9b9ca5ac644d0", &(0x7f0000000040)=""/121, 0x3800, 0x0, 0xab, 0xd0, &(0x7f00000000c0)="732c8e8ba99d88fe5a6ede61bde7150427e0956b2aa629c9d38cf44a2f9f7502f22cb43d514c1eb61972e1960e838cd9d1a0eea45dccf1a2d557f42da5d50465e7b3842741030c9c4e465de69bc2895b615d58854db5a5322070ec25d8f7d7db6d359de543da802d69225113641d9a6723161c1584d166033501fa86b289e7c0af91cbd702d071bdbe0c780c403b11213d289fdd33d0e970fa8a05795400c686af752089255dec5def4362", &(0x7f00000002c0)="d525b238f5376fe4605c1d355ddc13273e7bbd63d24dd32f223402eb22f076370bb66d03dfc8a03ca1c33fa2c42de8bf98b2f9fa6a668e156e5c49fe5dc3d17146756f5c88373f56571c11660da610435d6034460601dc8a5f7fbc4f96b14d3d13c016e70aa2a99a6525aa04745148e65289c615c2fa200387ceb2f689a77169a66b2fd22c2ad8d1243fd49474f4c5a9174a962c07d6064f1e9c7683fb9c1a6d4bd968fc7c90567106a3e426a4cde02b69f4deb775aec99c04ed293dd3c64868216c43df1ea8e0b0037f9c56d88b70bb"}, 0x40) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:57:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2e, 0x0, &(0x7f0000000040)=0x57) 20:57:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100005000) 20:57:22 executing program 0: unshare(0x44000600) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x16, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) [ 1434.001158][ T27] audit: type=1804 audit(1589144242.048:1855): pid=24901 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1287/cgroup.controllers" dev="sda1" ino=16375 res=1 20:57:22 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000040)=0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00'}, 0x30) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00', r4}, 0x30) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r6, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0xb4, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x200040c0}, 0x40820) [ 1434.088704][T24908] IPVS: ftp: loaded support on port[0] = 21 20:57:22 executing program 1: 20:57:22 executing program 1: 20:57:22 executing program 1: 20:57:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100005800) 20:57:22 executing program 1: [ 1434.626273][T24879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1434.658677][ T27] audit: type=1804 audit(1589144242.698:1856): pid=24928 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1288/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 1434.740233][T24876] bridge223: port 1(bond0) entered blocking state [ 1434.752183][T24876] bridge223: port 1(bond0) entered disabled state [ 1434.791648][T24876] device bond0 entered promiscuous mode [ 1434.807348][T24876] device bond_slave_0 entered promiscuous mode [ 1434.822938][T24876] device bond_slave_1 entered promiscuous mode [ 1434.838710][T24911] IPVS: ftp: loaded support on port[0] = 21 [ 1434.863464][T24913] device bond0 left promiscuous mode [ 1434.869054][T24913] device bond_slave_0 left promiscuous mode [ 1434.899039][T24913] device bond_slave_1 left promiscuous mode [ 1434.924507][T24913] bridge223: port 1(bond0) entered disabled state 20:57:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x900}}, 0x20}}, 0x0) [ 1435.780320][T24955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1435.829194][T24958] bridge223: port 1(bond0) entered blocking state [ 1435.838457][T24958] bridge223: port 1(bond0) entered disabled state [ 1435.859876][T24958] device bond0 entered promiscuous mode 20:57:23 executing program 1: 20:57:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100006000) 20:57:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x100, 0x1403, 0x20, 0x70bd2c, 0x25dfdbfd, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bridge_slave_0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond_slave_1\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'ip_vti0\x00'}}]}, 0x100}, 0x1, 0x0, 0x0, 0x24008010}, 0x24000845) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x248, 0xc8, 0x4e8, 0x248, 0x0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f00000002c0), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x41}, 0xffffff00, 0xff000000, 'geneve1\x00', 'veth0_to_bridge\x00', {0xff}, {0xff}, 0x16, 0x0, 0x10}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@l2tp={{0x30, 'l2tp\x00'}, {0x1, 0x2, 0x3, 0x1, 0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x20}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0xd7}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x26}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x15}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff000000, 0x0, 'vxcan1\x00', 'ip6erspan0\x00', {0xff}, {}, 0x29, 0x2}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x1, 0x3}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x44}, @empty, 0xff000000, 0x0, 'veth1_to_batadv\x00', 'xfrm0\x00', {0xff}, {0xff}, 0x8, 0x0, 0x55}, 0x0, 0x1a8, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x17e, 0x1ff, 0x20, 0x0, 'syz1\x00', 0x9}}, @common=@set={{0x40, 'set\x00'}, {{0x0, [0x5, 0x4, 0x2, 0x3, 0x4, 0x6], 0x3, 0x1}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x6, 0xde86, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x8}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x80000001, 0x8, @local, 0x4e24}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) [ 1435.875790][T24958] device bond_slave_0 entered promiscuous mode [ 1435.882786][T24958] device bond_slave_1 entered promiscuous mode [ 1435.900570][T24955] device bond0 left promiscuous mode [ 1435.905881][T24955] device bond_slave_0 left promiscuous mode [ 1435.922329][T24955] device bond_slave_1 left promiscuous mode [ 1435.954735][T24955] bridge223: port 1(bond0) entered disabled state [ 1436.084905][T24966] x_tables: duplicate underflow at hook 1 [ 1436.129980][ T27] audit: type=1804 audit(1589144244.168:1857): pid=24964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1289/cgroup.controllers" dev="sda1" ino=16369 res=1 [ 1436.163460][T24974] x_tables: duplicate underflow at hook 1 [ 1436.220948][T24958] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:26 executing program 0: unshare(0x44000600) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x16, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) 20:57:26 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[], 0x0) 20:57:26 executing program 1: 20:57:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100006800) 20:57:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xa00}}, 0x20}}, 0x0) 20:57:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:26 executing program 1: [ 1438.768264][T25001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1438.861262][ T27] audit: type=1804 audit(1589144246.908:1858): pid=25003 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1290/cgroup.controllers" dev="sda1" ino=16367 res=1 [ 1438.866370][T25007] IPVS: ftp: loaded support on port[0] = 21 20:57:27 executing program 1: 20:57:27 executing program 2: syz_emit_ethernet(0x41, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv4={0x800, @igmp={{0xa, 0x4, 0x1, 0x9, 0x33, 0x65, 0x0, 0x2, 0x2, 0x0, @loopback, @private=0xa010102, {[@cipso={0x86, 0x13, 0xffffffffffffffff, [{0x5, 0x4, "e47d"}, {0x5, 0x9, "72ba814bff0510"}]}, @noop]}}, {0x22, 0xe9, 0x0, @broadcast, "5439c3"}}}}}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r4, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x5ca, 0x400, 0xffff8001, 0x8, 0x48, 0x2, 0xf0}, &(0x7f00000000c0)=0x9c) bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) r6 = socket(0x10, 0x3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000002100010100000000000000000200000000000000000000000ce117006e19910e3b435b9d254b3935e28d084a335a59e06476c60595f95f06463a0b6a899c0bcf0558dff473543b1c976ada08d6cfe3ea463abebc9212e21af063fd46515848fe85458f4e363b170dee381ff98548be7d7858c5eae862f0bed925d0d11cc23b882015e70769f10d20a428f1d3a87f1045874c3b2b0eb84313fc7267a7bced2cc0", @ANYRES32=r8, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in6=@mcast2, 0x4e24, 0x1, 0x4e22, 0x4e6, 0x2, 0x80, 0x20, 0x3a, r5, r8}, {0x5, 0x6, 0xa99, 0x3, 0xff, 0x0, 0x7, 0x5}, {0x6, 0x7, 0x5, 0xe5}, 0x1, 0x6e6bc0, 0x1, 0x0, 0x2, 0x1}, {{@in=@multicast1, 0x4d4, 0xff}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x4, 0x2, 0x20, 0x10000, 0x7, 0x5}}, 0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@report={0x29c, 0x20, 0x20, 0x70bd2d, 0x25dfdbff, {0x6c, {@in6=@remote, @in=@multicast1, 0x4e22, 0x0, 0x4e24, 0x800, 0xa, 0xa0, 0x0, 0x87, 0x0, r8}}, [@algo_aead={0xcb, 0x12, {{'aegis128-aesni\x00'}, 0x3f8, 0x60, "5c1d0a10fe68bd2bb9fc61505b030942474ced2b61aea366b3d9f703ea10b63c99a491c808775ab64f2216377769c4305deea93eee06c13888e55f414309ba2bf60a71b7fdbe542fbe1b84b5f6c9a1b67bfca75e4e5a121e10fb20ad85f0030fe227fcdcc958d58e4f5010cea26fdb315988c357b5327a32aae4f0d7b837c2"}}, @algo_auth={0x114, 0x1, {{'cbcmac-aes-ce\x00'}, 0x660, "02c96ad434c990b7157416eec8bf13f77d92bb79f22314e9f2d898ee442b53ee3868696850901b929c7e8bc559c727a486a87dc1e7d6ab5cb00d3899e3d6e6f2f6e73a2386a4f86455cec68083e5f25a01eebddfd564048f6c01988ab5334280dfc0b296fdfd16c5a6dcc67c61ac0fe51580e560db507da8f483bba99e4feca57ee664eca8726a2e14fd1f38c2d2556c2e98cf40c0275e3a34eedd1a9359109c4bed9675b5193d53b35b410d6f900f02592f84da75ffc0a2c6dc6a615a9d0aaaca4c3dd15e02c657daa0e2d7"}}, @extra_flags={0x8, 0x18, 0x7a8}, @sec_ctx={0x68, 0x8, {0x64, 0x8, 0x0, 0x1, 0x5c, "bc85a3ae2f6956bbc542f9c7887df401c94ba3f4f60463b5030165c39e47031ecceeb2ab14ecbbd8b534ba730c943f499b37c883d55e8e260e5856f5d13c94e5b71caf4fbe492026f4da0e3a3677167d547a5798e0de54939d53ac78"}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) 20:57:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100007000) 20:57:27 executing program 1: 20:57:27 executing program 1: [ 1439.361204][ T27] audit: type=1804 audit(1589144247.408:1859): pid=25026 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1291/cgroup.controllers" dev="sda1" ino=16373 res=1 [ 1439.647191][T25008] bridge224: port 1(bond0) entered blocking state [ 1439.655230][T25008] bridge224: port 1(bond0) entered disabled state [ 1439.673584][T25008] device bond0 entered promiscuous mode [ 1439.679915][T25008] device bond_slave_0 entered promiscuous mode [ 1439.707211][T25008] device bond_slave_1 entered promiscuous mode [ 1439.734131][T25014] device bond0 left promiscuous mode [ 1439.746239][T25014] device bond_slave_0 left promiscuous mode [ 1439.758639][T25014] device bond_slave_1 left promiscuous mode [ 1439.765641][T25014] bridge224: port 1(bond0) entered disabled state [ 1439.893152][T25024] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1439.907175][T25032] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1439.923602][T25001] bridge224: port 1(bond0) entered blocking state [ 1439.931781][T25001] bridge224: port 1(bond0) entered disabled state [ 1439.940338][T25001] device bond0 entered promiscuous mode [ 1439.946098][T25001] device bond_slave_0 entered promiscuous mode [ 1439.952677][T25001] device bond_slave_1 entered promiscuous mode [ 1439.961915][T25034] device bond0 left promiscuous mode [ 1439.967216][T25034] device bond_slave_0 left promiscuous mode [ 1439.976753][T25034] device bond_slave_1 left promiscuous mode [ 1439.983571][T25034] bridge224: port 1(bond0) entered disabled state 20:57:29 executing program 0: 20:57:29 executing program 1: 20:57:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100007800) 20:57:29 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095637cbaea1ea19f530d86dd60eaa83600452f00fe8000000000000000000000000000aafe8000000000000000000000000000aa242088be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000dffdee40c3b5f52f5d744150e9"], 0x0) syz_emit_ethernet(0x56, &(0x7f00000000c0)={@remote, @local, @void, {@canfd={0xd, {{0x4, 0x0, 0x1, 0x1}, 0x35, 0x1, 0x0, 0x0, "ad082d2d256a2c7b8250e09f9045a948c43a6b1e66f266c6682c3c2ea98409aa5d2442c56ac97c89a8afd637beece7d751c5c4e8f19cec93d149243cc0afd934"}}}}, &(0x7f0000000140)={0x1, 0x1, [0x613, 0xa6d, 0x3ed, 0xd06]}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000006, 0x8050, r3, 0x9b10000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xd8, r2, 0x20, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:hald_cache_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg2\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:cron_log_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x4}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6_vti0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:etc_mail_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4000011}, 0x40000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_ACCEPT(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0xc0, r2, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6erspan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:logrotate_exec_t:s0\x00'}]}, 0xc0}, 0x1, 0x0, 0x0, 0x48020}, 0x800) 20:57:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xc00}}, 0x20}}, 0x0) 20:57:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:29 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000180c20000000180c20000000806"], 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1441.510056][T25061] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:29 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000180c20000000180c20000000806"], 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1441.537356][ T27] audit: type=1804 audit(1589144249.578:1860): pid=25058 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1292/cgroup.controllers" dev="sda1" ino=16374 res=1 [ 1441.569419][T25067] bridge224: port 1(bond0) entered blocking state [ 1441.604975][T25067] bridge224: port 1(bond0) entered disabled state [ 1441.625908][T25067] device bond0 entered promiscuous mode [ 1441.632691][T25067] device bond_slave_0 entered promiscuous mode [ 1441.645048][T25067] device bond_slave_1 entered promiscuous mode 20:57:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000f000) [ 1441.986888][ T27] audit: type=1804 audit(1589144250.028:1861): pid=25092 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1293/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 1442.127168][T25061] device bond0 left promiscuous mode [ 1442.133328][T25061] device bond_slave_0 left promiscuous mode [ 1442.139525][T25061] device bond_slave_1 left promiscuous mode [ 1442.147653][T25061] bridge224: port 1(bond0) entered disabled state 20:57:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000fff0) 20:57:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r1, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r2], 0x4}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800001a9f7708f7948500100005070000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r6, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r4, @ANYRES16=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r5, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, r1, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xffff0000}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1442.395940][ T27] audit: type=1804 audit(1589144250.438:1862): pid=25103 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1294/cgroup.controllers" dev="sda1" ino=16382 res=1 [ 1442.666448][T25097] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1442.704248][T25067] bridge224: port 1(bond0) entered blocking state [ 1442.721260][T25067] bridge224: port 1(bond0) entered disabled state [ 1442.740100][T25067] device bond0 entered promiscuous mode [ 1442.750093][T25067] device bond_slave_0 entered promiscuous mode [ 1442.756714][T25067] device bond_slave_1 entered promiscuous mode [ 1442.786286][T25106] device bond0 left promiscuous mode [ 1442.792286][T25106] device bond_slave_0 left promiscuous mode [ 1442.812925][T25106] device bond_slave_1 left promiscuous mode [ 1442.825024][T25106] bridge224: port 1(bond0) entered disabled state 20:57:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10018aad7) [ 1443.078308][ T27] audit: type=1804 audit(1589144251.118:1863): pid=25121 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1295/cgroup.controllers" dev="sda1" ino=16382 res=1 20:57:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xe00}}, 0x20}}, 0x0) 20:57:31 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x10, 0x3f2, 0x8, 0x70bd2a, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @null, @rose={'rose', 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:57:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xffffffffffffffbf, 0x2, 0x0, 0x1, [@IFLA_VLAN_INGRESS_QOS={0x0, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING]}, @IFLA_VLAN_FLAGS={0xc}, @IFLA_VLAN_INGRESS_QOS={0x0, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING]}, @IFLA_VLAN_EGRESS_QOS={0x0, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING, @IFLA_VLAN_QOS_MAPPING]}]}}}, @IFLA_WEIGHT={0x8}]}, 0x50}}, 0x0) [ 1443.392342][T25132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1443.426892][T25132] bridge224: port 1(bond0) entered blocking state 20:57:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1443.465107][T25132] bridge224: port 1(bond0) entered disabled state [ 1443.494231][T25132] device bond0 entered promiscuous mode 20:57:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xb33, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x74, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x5eb, @dev={0xfe, 0x80, [], 0xb}, 0x2}, @in={0x2, 0x4e24, @private=0xa010100}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e20, 0x1000, @loopback}, @in6={0xa, 0x4e21, 0xfffffffc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf68}]}, &(0x7f0000000140)=0x10) syz_emit_ethernet(0xf9, &(0x7f00000002c0)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0xc3, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "6ea3c136bc09a75261a7a1bc7291522aa2377dde8a0c68b09b1c27e7c71fa6c9f897dabefdcc13c4f4db00b00a8011f5c4f141aa45cda70231d40147577873d3159c0ac2142c8ff3e61e6ab03d063063460ffec962cbdd8d3841ef81db7fb2ead1a755beafaba0840e4196d1948124d8da4850e21ae9969327f99c76074d"}}}}}}}, 0x0) [ 1443.517068][T25132] device bond_slave_0 entered promiscuous mode [ 1443.552354][T25132] device bond_slave_1 entered promiscuous mode [ 1443.584215][T25138] device bond0 left promiscuous mode [ 1443.589652][T25138] device bond_slave_0 left promiscuous mode [ 1443.608252][T25138] device bond_slave_1 left promiscuous mode [ 1443.634422][T25138] bridge224: port 1(bond0) entered disabled state 20:57:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffff000) [ 1443.806089][T25141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1443.821623][T25141] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:57:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast2, 0x0, r3}) 20:57:32 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x1}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x52}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x4}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x608}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x4}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 20:57:32 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0500"/12, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000000e5096133"], 0x48}}, 0x0) [ 1443.971293][ T27] audit: type=1804 audit(1589144252.018:1864): pid=25158 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1296/cgroup.controllers" dev="sda1" ino=16368 res=1 20:57:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffff0) [ 1444.367458][ T27] audit: type=1804 audit(1589144252.409:1865): pid=25179 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1297/cgroup.controllers" dev="sda1" ino=16374 res=1 [ 1444.392562][T25163] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1444.420987][T25173] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1444.451295][T25132] bridge224: port 1(bond0) entered blocking state [ 1444.457805][T25132] bridge224: port 1(bond0) entered disabled state [ 1444.469700][T25132] device bond0 entered promiscuous mode [ 1444.477632][T25132] device bond_slave_0 entered promiscuous mode [ 1444.486079][T25132] device bond_slave_1 entered promiscuous mode [ 1444.496693][T25175] device bond0 left promiscuous mode [ 1444.502591][T25175] device bond_slave_0 left promiscuous mode [ 1444.509167][T25175] device bond_slave_1 left promiscuous mode [ 1444.517069][T25175] bridge224: port 1(bond0) entered disabled state 20:57:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x4, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000380)={0x41, 0x2, 0x3}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000706010400ec20f5d3b6454af6bbe70c55afe148eddd8300000000000000d387bfd7fc6be794a044a3f40000000000000000"], 0x87a434fef1a37449}}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x20, 0x1411, 0x100, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000040}, 0x4804) socketpair(0x21, 0x4, 0x16400000, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r4, &(0x7f0000002140)={&(0x7f0000002080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002100)={&(0x7f00000020c0)=@ipv6_newroute={0x1c, 0x18, 0x10, 0x70bd26, 0x25dfdbfd, {0xa, 0x80, 0x0, 0x2, 0xfd, 0x0, 0xfe, 0x2, 0x2500}}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x2000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) sendfile(r5, r3, 0x0, 0x100000002) 20:57:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x408, 0x210, 0x0, 0x210, 0x320, 0x320, 0x320, 0x7fffffe, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70], 0xc0, 0x10a}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'sit0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@random="4aacb2f8fc94", @loopback, @empty}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x458) 20:57:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x2000}}, 0x20}}, 0x0) 20:57:32 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc67b96c26b7b765e}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf4, 0xa, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x9}, [@IPSET_ATTR_ADT={0x74, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0xa6a}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x1ff}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x818}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x1}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x7fff}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x18}, @IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x48000}, 0x4040000) 20:57:32 executing program 0: 20:57:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:32 executing program 1: 20:57:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c040000070201040014ffde0000000000000000a25c24503f621a554972207abd22c61de52e739083b1212cd4dc2db5d12c5b5855d9b1291c96bef8ab6428e5928b0b685439d16d9f7427cc47454ef25887710ad25c473c55407fa5dd2122"], 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000000)=0x81, 0x4) 20:57:32 executing program 0: 20:57:32 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1444.874847][T25205] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1444.989328][T25209] bridge224: port 1(bond0) entered blocking state [ 1445.007858][T25209] bridge224: port 1(bond0) entered disabled state 20:57:33 executing program 1: [ 1445.045055][T25209] device bond0 entered promiscuous mode [ 1445.069889][T25209] device bond_slave_0 entered promiscuous mode 20:57:33 executing program 0: 20:57:33 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00fe8000000000000000000000000000aafe8000000000000000000000000000aa242088be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000fdbe65bfb0e419358d7fe537023ae13553a0ffacf1a57de4ebadd6783e79f0995da321da9ebe5bd928ad759edb753a2084337291314044846b4e71aae5452532d34ae47795565698189a62ecf5"], 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000001140)={{&(0x7f0000000100)=""/4096, 0x1000}, &(0x7f0000001100), 0x4}, 0x20) [ 1445.098000][T25209] device bond_slave_1 entered promiscuous mode [ 1445.126681][ T27] audit: type=1804 audit(1589144253.169:1866): pid=25222 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1299/cgroup.controllers" dev="sda1" ino=16012 res=1 [ 1445.136033][T25213] device bond0 left promiscuous mode [ 1445.187918][T25213] device bond_slave_0 left promiscuous mode 20:57:33 executing program 1: [ 1445.222729][T25213] device bond_slave_1 left promiscuous mode [ 1445.260543][T25213] bridge224: port 1(bond0) entered disabled state [ 1445.615123][T25205] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x3f00}}, 0x20}}, 0x0) 20:57:33 executing program 0: 20:57:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket(0x10, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r3, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x30, r3, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff0001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040040}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r6, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r6, 0x1}, &(0x7f0000000040)=0x8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[@ANYBLOB="b7e095637cbaea1ea186010000000000000000452f00fe8000000000000000000000000000aafe8000000000000000000000000000aa2200000800000086c4080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655840000000"], 0x0) [ 1445.919465][T25255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1445.966747][T25255] bridge224: port 1(bond0) entered blocking state [ 1445.981283][T25255] bridge224: port 1(bond0) entered disabled state [ 1445.988979][T25255] device bond0 entered promiscuous mode [ 1446.003221][T25255] device bond_slave_0 entered promiscuous mode 20:57:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:34 executing program 1: 20:57:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000408010229ac24b40767fd4a8e1900060920eaf2ecced3d7226571634ca5f488c4c514b87300"/59], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x10) sendfile(r2, r1, 0x0, 0x100000002) 20:57:34 executing program 0: 20:57:34 executing program 2: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000080)=0x1, 0x4) syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa8360081390dd00000aafe800000000000362bdf5c763e901288be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"/120, @ANYRES64], 0x0) [ 1446.017019][T25255] device bond_slave_1 entered promiscuous mode [ 1446.027570][T25259] device bond0 left promiscuous mode [ 1446.040634][T25259] device bond_slave_0 left promiscuous mode [ 1446.046822][T25259] device bond_slave_1 left promiscuous mode [ 1446.080830][T25259] bridge224: port 1(bond0) entered disabled state 20:57:34 executing program 0: 20:57:34 executing program 1: 20:57:34 executing program 2: syz_emit_ethernet(0x9b, &(0x7f0000000000)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x65, 0x2f, 0x0, @local, @local, {[@hopopts={0x6, 0x2, [], [@pad1, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x4}, @enc_lim]}], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') epoll_create1(0x80000) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r2, 0x8b8e0eb13081c495, 0x0, 0x0, {{0x1, 0x0, 0x5901}, {0x0, 0x4109}, {0x4c, 0x18, {0x60, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000004) [ 1446.218985][ T27] audit: type=1804 audit(1589144254.259:1867): pid=25265 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1300/cgroup.controllers" dev="sda1" ino=16376 res=1 20:57:34 executing program 0: 20:57:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4000}}, 0x20}}, 0x0) 20:57:34 executing program 1: 20:57:34 executing program 0: [ 1446.700730][T25259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1446.799252][T25295] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1446.827780][T25295] bridge225: port 1(bond0) entered blocking state [ 1446.835010][T25295] bridge225: port 1(bond0) entered disabled state [ 1446.846826][T25295] device bond0 entered promiscuous mode [ 1446.853146][T25295] device bond_slave_0 entered promiscuous mode [ 1446.859596][T25295] device bond_slave_1 entered promiscuous mode [ 1446.877133][T25305] device bond0 left promiscuous mode [ 1446.883081][T25305] device bond_slave_0 left promiscuous mode [ 1446.889156][T25305] device bond_slave_1 left promiscuous mode [ 1446.904656][T25305] bridge225: port 1(bond0) entered disabled state 20:57:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x20, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_DST={0x4, 0x13}]}, 0x20}}, 0x0) syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[], 0x0) 20:57:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="0b010700ba03000001000000ffff00001103000005000000000000000000000073edac14d884bd4f103830a0d42311e9685e08b55dbf9503d2c045f4c6005c9c58c2e947c5c113a41e3db8945402415594323b9256d28805e02360b297f9b0d7a7d40ad7edfb419fc43104679175381e6d6d6809e0e42e9cc49bf42060682e3d92ba2c25e5f17207c10866f55713798108777691ea82662d7981fa3108dce8a2dc568e4dbded2a0cfe6e28b26418baed856c76eba8281dd2a3fbde45d4945fa2e53a8ed97a97c49e54f5eded3bd6d625e128770acecc568551adca92b7c151ac1c6eab9df500"/981], 0x3d5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c13f1d1e1dcd78a681df936cc894a000000070601040000000000000000000000000500110007000000"], 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:57:35 executing program 0: 20:57:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:35 executing program 1: [ 1447.134831][T25305] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:35 executing program 1: 20:57:35 executing program 0: [ 1447.241814][ T27] audit: type=1804 audit(1589144255.289:1868): pid=25318 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1301/cgroup.controllers" dev="sda1" ino=16366 res=1 20:57:35 executing program 0: 20:57:35 executing program 1: 20:57:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4800}}, 0x20}}, 0x0) 20:57:35 executing program 0: 20:57:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000180)={r3, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000040)={r7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000180)={r7, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)={r7, 0x26, "7a48cfe1a62fed5c7907a9f994bd28ffa66b0f13898f7c95789fdf354150c00e1a2d6cc7fbf5"}, &(0x7f00000000c0)=0x2e) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={r3, 0xff, 0xffff, 0x1, 0x2, 0x5, 0x80, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0x1000}}, 0x6, 0xfb9, 0x8000, 0x20, 0x7}}, &(0x7f0000000140)=0xb0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000002) 20:57:35 executing program 1: 20:57:35 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00a1c0e46bffb65226c9668d85be371c91fe8000000000000000aafe8000000000000000000000000000aa242088be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 20:57:35 executing program 0: [ 1447.865791][ T27] audit: type=1804 audit(1589144255.909:1869): pid=25343 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1302/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 1448.234308][T25353] bridge226: port 1(bond0) entered blocking state [ 1448.242840][T25353] bridge226: port 1(bond0) entered disabled state [ 1448.251139][T25353] device bond0 entered promiscuous mode [ 1448.257028][T25353] device bond_slave_0 entered promiscuous mode [ 1448.264056][T25353] device bond_slave_1 entered promiscuous mode [ 1448.279184][T25354] device bond0 left promiscuous mode [ 1448.286905][T25354] device bond_slave_0 left promiscuous mode [ 1448.297515][T25354] device bond_slave_1 left promiscuous mode [ 1448.304551][T25354] bridge226: port 1(bond0) entered disabled state 20:57:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:36 executing program 1: 20:57:36 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0x100000001, 0x8) 20:57:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 20:57:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x22010, r2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000180)={r6, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={r6, 0x94, &(0x7f0000000200)=[@in={0x2, 0x4e24, @private=0xa010101}, @in6={0xa, 0x4e23, 0x1, @empty, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x64010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}, @in6={0xa, 0x4e21, 0xffff, @private1={0xfc, 0x1, [], 0x1}, 0xfff}, @in={0x2, 0x4e24, @private=0xa010100}]}, &(0x7f00000000c0)=0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x100000002) 20:57:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000000280)='*', 0x1}], 0x1}}], 0x1, 0x0) 20:57:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4c00}}, 0x20}}, 0x0) 20:57:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4800, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x6c, 0x0, 0x3f00}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xf0}, 0x0) 20:57:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000060601"], 0x54c}}, 0x0) 20:57:36 executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 20:57:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4000}}, 0x20}}, 0x0) [ 1449.371734][T25387] team0: Device ipvlan1 failed to register rx_handler [ 1449.437431][ T27] audit: type=1804 audit(1589144257.479:1870): pid=25379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1303/cgroup.controllers" dev="sda1" ino=16373 res=1 [ 1449.535542][ T27] audit: type=1804 audit(1589144257.479:1871): pid=25385 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1303/cgroup.controllers" dev="sda1" ino=16373 res=1 20:57:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000000000000040000000500010007000000483eb39b72718124ae860600000028319e6a75189be50efb03cf3109e799"], 0x87a434fef1a37449}}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r2, 0x9}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 1449.699853][ T27] audit: type=1804 audit(1589144257.739:1872): pid=25414 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1303/cgroup.controllers" dev="sda1" ino=16373 res=1 [ 1449.784630][T25391] __nla_validate_parse: 2 callbacks suppressed [ 1449.784642][T25391] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1449.869784][T25395] bridge227: port 1(bond0) entered blocking state [ 1449.876604][T25395] bridge227: port 1(bond0) entered disabled state [ 1449.906213][ T27] audit: type=1804 audit(1589144257.949:1873): pid=25421 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1304/cgroup.controllers" dev="sda1" ino=15971 res=1 [ 1449.919097][T25395] device bond0 entered promiscuous mode [ 1449.964480][T25395] device bond_slave_0 entered promiscuous mode [ 1449.996934][T25395] device bond_slave_1 entered promiscuous mode [ 1450.026864][T25397] device bond0 left promiscuous mode [ 1450.032961][T25397] device bond_slave_0 left promiscuous mode [ 1450.047951][T25397] device bond_slave_1 left promiscuous mode [ 1450.068802][T25397] bridge227: port 1(bond0) entered disabled state [ 1450.231707][T25404] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1450.248613][T25407] bridge9: port 1(bond0) entered blocking state [ 1450.255311][T25407] bridge9: port 1(bond0) entered disabled state [ 1450.264169][T25407] device bond0 entered promiscuous mode [ 1450.271016][T25407] device bond_slave_0 entered promiscuous mode [ 1450.277522][T25407] device bond_slave_1 entered promiscuous mode [ 1450.287370][T25407] device bridge8 entered promiscuous mode [ 1450.296525][T25408] device bond0 left promiscuous mode [ 1450.303177][T25408] device bond_slave_0 left promiscuous mode [ 1450.309336][T25408] device bond_slave_1 left promiscuous mode [ 1450.316855][T25408] device bridge8 left promiscuous mode [ 1450.323247][T25408] bridge9: port 1(bond0) entered disabled state [ 1450.452397][T25418] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1450.474585][T25417] bridge227: port 1(bond0) entered blocking state [ 1450.484386][T25417] bridge227: port 1(bond0) entered disabled state [ 1450.492699][T25417] device bond0 entered promiscuous mode [ 1450.498353][T25417] device bond_slave_0 entered promiscuous mode [ 1450.505090][T25417] device bond_slave_1 entered promiscuous mode [ 1450.516185][T25419] device bond0 left promiscuous mode [ 1450.522994][T25419] device bond_slave_0 left promiscuous mode [ 1450.529053][T25419] device bond_slave_1 left promiscuous mode [ 1450.535629][T25419] bridge227: port 1(bond0) entered disabled state 20:57:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffff0) 20:57:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x14) syz_emit_ethernet(0x7f, &(0x7f0000000080)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x49, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x101, 0x1]}}}}}}}, 0x0) 20:57:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4000}}, 0x20}}, 0x0) 20:57:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="940000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="00001000000000000e00000009000100666c6f770000000064000200080006000000000008000100304900000800020001000000080003"], 0x94}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x80000000, 0x401, 0x1ff, 0x448, r0, 0x4, [], r3, r0, 0x3, 0x0, 0x2}, 0x40) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000180)={{0x2, 0x0, @descriptor="c3dc080cb39d6724"}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00000007fdbc65ec4fae45101b98d0f7000400008009c5341c93e3e646a477a700000000000000000000f7ff010007000000"], 0x87a434fef1a37449}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x14, 0x4) r6 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r5, 0x0, 0x100000002) 20:57:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x5865}}, 0x20}}, 0x0) 20:57:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000000}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x44}, 0x1, 0x0, 0x0, 0x40001}, 0x8000) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) [ 1450.984014][T25452] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1451.038324][T25458] bridge227: port 1(bond0) entered blocking state [ 1451.077287][T25458] bridge227: port 1(bond0) entered disabled state [ 1451.106757][T25458] device bond0 entered promiscuous mode [ 1451.135126][T25458] device bond_slave_0 entered promiscuous mode [ 1451.164634][T25458] device bond_slave_1 entered promiscuous mode [ 1451.174133][ T27] audit: type=1804 audit(1589144259.219:1874): pid=25464 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1305/cgroup.controllers" dev="sda1" ino=16211 res=1 [ 1451.199140][T25457] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1451.226057][T25452] device bond0 left promiscuous mode [ 1451.232111][T25452] device bond_slave_0 left promiscuous mode [ 1451.238512][T25452] device bond_slave_1 left promiscuous mode [ 1451.250027][T25452] bridge227: port 1(bond0) entered disabled state [ 1451.295303][ T27] audit: type=1804 audit(1589144259.339:1875): pid=25459 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1446/cgroup.controllers" dev="sda1" ino=16018 res=1 [ 1451.424627][T25466] bridge9: port 1(bond0) entered blocking state [ 1451.432489][T25466] bridge9: port 1(bond0) entered disabled state [ 1451.450071][T25466] device bond0 entered promiscuous mode [ 1451.456257][T25466] device bond_slave_0 entered promiscuous mode [ 1451.470778][T25466] device bond_slave_1 entered promiscuous mode [ 1451.477241][T25466] device bridge8 entered promiscuous mode [ 1451.491873][T25460] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1451.513495][T25470] device bond0 left promiscuous mode [ 1451.518966][T25470] device bond_slave_0 left promiscuous mode 20:57:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x118, 0x1, 0x3, 0x201, 0x0, 0x0, {0x7}, [@NFQA_PAYLOAD={0x39, 0xa, "192ab703e882f63b52c872c97d1b018f3a1d63f11b0388de4116bd35ef43b6cdc3d0fb0c05d26b1b0ce3b5b79300ab124997dc47a9"}, @NFQA_EXP={0xc8, 0xf, 0x0, 0x1, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x6}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}, @CTA_EXPECT_NAT={0x34, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x28, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x34}}}}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}, @CTA_EXPECT_MASTER={0x4c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x9}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x20004890}, 0x20008090) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 1451.533447][T25470] device bond_slave_1 left promiscuous mode [ 1451.546091][T25470] device bridge8 left promiscuous mode [ 1451.566559][T25470] bridge9: port 1(bond0) entered disabled state 20:57:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x20, 0x0}}, 0xc) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x40eae, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000911d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) close(r1) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) accept$inet(r4, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) r5 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r5, 0x0, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000100)=0x1, 0x4) syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x0) [ 1451.699957][ T27] audit: type=1804 audit(1589144259.749:1876): pid=25489 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1306/cgroup.controllers" dev="sda1" ino=16211 res=1 [ 1451.886615][T25496] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 20:57:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffff0) 20:57:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x4000}}, 0x20}}, 0x0) [ 1452.252846][T25493] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1452.298288][T25458] bridge227: port 1(bond0) entered blocking state [ 1452.309462][ T27] audit: type=1804 audit(1589144260.349:1877): pid=25502 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1447/cgroup.controllers" dev="sda1" ino=16145 res=1 [ 1452.364950][T25458] bridge227: port 1(bond0) entered disabled state [ 1452.403530][T25458] device bond0 entered promiscuous mode [ 1452.426363][T25458] device bond_slave_0 entered promiscuous mode [ 1452.455813][ T27] audit: type=1804 audit(1589144260.489:1878): pid=25489 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1306/cgroup.controllers" dev="sda1" ino=16211 res=1 [ 1452.469648][T25458] device bond_slave_1 entered promiscuous mode [ 1452.495882][T25495] device bond0 left promiscuous mode [ 1452.508017][T25495] device bond_slave_0 left promiscuous mode [ 1452.517223][T25495] device bond_slave_1 left promiscuous mode 20:57:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x37, 0x7, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL]}, 0x1c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) r3 = socket(0x1000000010, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x6, 0x122c, [0x0, 0x20000440, 0x2000053e, 0x200007fa], 0x0, &(0x7f0000000280), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x5, 0x2, 0xa00, 'tunl0\x00', 'gre0\x00', 'veth1_to_team\x00', 'caif0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x9e, 0x9e, 0xce, [@vlan={{'vlan\x00', 0x0, 0x8}, {{0x1, 0x0, 0x15024, 0x2, 0x7}}}], [], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{0x3, 0x0, 0x9a74, 'nr0\x00', 'ipvlan1\x00', 'syz_tun\x00', 'veth0_to_team\x00', @multicast, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @random="51eea482e992", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xd6, 0x106, 0x156, [@cluster={{'cluster\x00', 0x0, 0x10}, {{0x1, 0xc00, 0x2}}}, @cpu={{'cpu\x00', 0x0, 0x8}, {{0x205}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@log={'log\x00', 0x28, {{0xb2, "ec7cab40fe1a584e7bd7ed6307498e37bc228d4a2921d3dc83b97a2cd619", 0x5}}}}, {0x11, 0x20, 0x22eb, 'veth0\x00', 'veth1_to_batadv\x00', 'syzkaller0\x00', 'macvlan0\x00', @remote, [0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x9e, 0xfe, 0x136, [@cpu={{'cpu\x00', 0x0, 0x8}, {{0xfa9}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}], @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x2, 0xf7, 'macvtap0\x00', 'team_slave_0\x00', 'bond0\x00', 'xfrm0\x00', @link_local, [0xff, 0x0, 0xff], @dev={[], 0xa}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x1ee, 0x21e, [], [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x7ff, {0xffffffff}}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xc964, 'system_u:object_r:ssh_keygen_exec_t:s0\x00'}}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{0x11, 0x10, 0x200, 'ipvlan0\x00', 'vxcan1\x00', 'tunl0\x00', 'bridge_slave_1\x00', @empty, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @multicast, [0xff, 0x0, 0x1fe, 0x0, 0xff], 0x96e, 0x9ee, 0xa3e, [@among={{'among\x00', 0x0, 0x868}, {{@offset, @offset, 0x0, {[0x7ff, 0x7fffffff, 0x7fffffff, 0x3, 0x81, 0x1000, 0x0, 0x5, 0x1, 0x89, 0xd58, 0x1, 0x9, 0x8001, 0xff, 0xffffffff, 0x62b974cb, 0x20, 0x1, 0x5, 0xffffff00, 0xc917, 0x9, 0x0, 0x100, 0x3, 0x8, 0x2, 0x8000, 0xb4, 0x7, 0x3ff, 0x3f, 0x9, 0x3, 0xf0000000, 0x1, 0x6, 0x6, 0x683d83c3, 0x99, 0x7fffffff, 0x7, 0x6, 0xa0, 0x0, 0x1000, 0x0, 0x6, 0x741, 0x3, 0x7, 0x0, 0x7, 0x3f, 0xff, 0xb130, 0xffffffff, 0x3f, 0xc54, 0x7f, 0x687b, 0x100, 0x80, 0x9, 0x1000, 0xffffffff, 0x0, 0x756, 0x77b, 0x65, 0x5, 0x0, 0x8001, 0x7937, 0x65, 0xfffff18e, 0x2, 0x2, 0x401, 0x8, 0x8, 0x5, 0x100, 0x4, 0x7, 0xffffffff, 0x40, 0x4, 0xff1c, 0x3f, 0x7, 0x5, 0x3ff, 0x7ff, 0x101, 0x7, 0x1000, 0x20, 0xcd, 0x10000, 0xde, 0xffffff6f, 0x9, 0xe0, 0x7, 0x3274643e, 0x8, 0xc69, 0x1, 0x3, 0xff, 0x9, 0x6, 0x6, 0x1b15, 0x2, 0xffffff53, 0x0, 0x80, 0xd, 0xc638, 0x7, 0x7, 0x1, 0x1ff, 0x400, 0x951, 0x881, 0x1000000, 0xa26e, 0x20, 0x6, 0x9, 0x71, 0x40, 0x3, 0xfffffeff, 0x5, 0x3d2, 0x1, 0x20, 0x81, 0x0, 0xffffff7f, 0x1, 0x6, 0x4, 0x8, 0x5, 0x3, 0x3, 0x1, 0x1, 0x0, 0x8, 0xf27c, 0x7, 0x3f, 0x1ff, 0x6784, 0x80000000, 0xfffffffb, 0x7, 0x8000, 0xffffffff, 0x7f, 0x1, 0x7, 0x8, 0x80000000, 0x642a, 0x4, 0x8e, 0x10001, 0x8, 0x7, 0x7, 0x1, 0x6, 0xff, 0x7, 0x3ff, 0x1fd3a0, 0xfffffffd, 0xffffffff, 0x9, 0xdfbb, 0xfff, 0x3, 0x5, 0x7f, 0x5, 0x3, 0xff, 0x6, 0x5, 0x10000, 0x3f, 0x8, 0x0, 0x6, 0x1, 0x10e, 0x100020, 0x0, 0x40, 0x5, 0x20, 0x3, 0xdd, 0xad03, 0x5, 0x4, 0x3, 0x90000, 0x5, 0x40, 0x2, 0x1, 0x6, 0x7, 0x2, 0xffffff46, 0x4, 0x0, 0x1, 0x3f, 0x5, 0x7, 0x79a, 0x1ff, 0xf4c, 0x6, 0x3ff, 0x8, 0x9, 0xff, 0x4, 0x5, 0x37, 0x55ca, 0x7ff, 0x2a4, 0x1, 0xf1e, 0x8, 0x0, 0x1, 0x9, 0x3ff, 0xb1e, 0x80000001, 0x0, 0x86, 0x0, 0x7cf], 0x4, [{[0xfffffff7, 0x3], @broadcast}, {[0x1ff, 0x9], @broadcast}, {[0xfffffffa], @rand_addr=0x64010101}, {[0x2, 0x2], @private=0xa010100}]}, {[0xe45, 0x0, 0x0, 0x31dee2bf, 0x1ff, 0x2, 0x2, 0xbaeb, 0x400, 0x0, 0x401, 0x6424, 0x1, 0x9, 0xedf, 0x6, 0x1, 0x8, 0x3, 0x1, 0x6, 0x2, 0x3, 0x4aa, 0x6, 0x2f87, 0xff, 0x1, 0x3f, 0x5, 0xff, 0xffffffff, 0x1ff, 0x7, 0x5, 0x400, 0xcc0, 0x8, 0x1, 0x6, 0x7fffffff, 0xfffffab4, 0x9, 0x1, 0x20, 0x8, 0x3ff, 0x48d, 0x800000, 0x10000, 0x619, 0xb9, 0x4, 0x1000, 0x8, 0x7, 0x10001, 0x8001, 0x1ff, 0x38, 0xa206, 0x5, 0x3c440, 0x40, 0x3, 0x400, 0xfffffffe, 0x216, 0x5, 0x5, 0x681f, 0x7, 0x2, 0x4, 0xfffffffa, 0xffffffff, 0x2, 0xfffffffb, 0x20, 0x7, 0x1, 0x6, 0x9, 0x1, 0x21b0, 0x101, 0x10001, 0x1f, 0x1, 0x2, 0x8, 0xffffffe0, 0x5bbc, 0xffffffff, 0xffffff7f, 0x7fffffff, 0x5d9, 0x8, 0xfffff801, 0x400, 0x7fff, 0x9, 0x1, 0x1000, 0x0, 0x10001, 0x225f, 0x1, 0xffff0001, 0xf2, 0xc0000, 0xd37, 0xfffff314, 0x1, 0x5, 0x4, 0x6, 0x0, 0x5, 0x24fc1dee, 0x2, 0x3, 0x5, 0x1, 0xfff, 0x1ff, 0x80000000, 0xb56c, 0x4, 0x8001, 0xe5a1, 0x3, 0x8, 0x80, 0x1048, 0x3, 0x3, 0xff, 0x2, 0x78, 0x5, 0x7, 0x5, 0x1, 0xfff, 0x7fff, 0x0, 0x0, 0x1, 0x8, 0x3, 0x6, 0x4, 0x8, 0x1, 0x5, 0x8001, 0x5c, 0xfffffc08, 0x10000, 0x81, 0x8, 0x1, 0x0, 0x41, 0x0, 0x5, 0x400, 0x2, 0x4e45, 0xbf, 0x3, 0x4, 0xac39, 0x7, 0x7, 0x9, 0xffffffc0, 0x9, 0x7fffffff, 0x81, 0x4, 0x3ff, 0x8, 0xf03, 0x200, 0x100, 0x80, 0x0, 0x5, 0x6, 0xc23, 0x200, 0x1000, 0x80000000, 0x8, 0x4, 0x200, 0x40, 0x32e, 0x2, 0x7, 0x7, 0x8001, 0x8, 0x4, 0xfffffff8, 0xf0f6, 0x4, 0xff, 0xddb, 0x4, 0x5, 0x2, 0x20, 0x800, 0x6, 0xfffffffb, 0x3, 0x3ff, 0x3, 0x2, 0x3, 0xffffffff, 0x9, 0x3, 0xf40, 0x3, 0x81, 0x2, 0x2, 0x101, 0x80, 0xe8b, 0xe106, 0x7f, 0x3, 0x6, 0xb3, 0x6, 0x7f, 0x0, 0x8, 0xfffffe01, 0x6, 0x10000, 0x8, 0x7, 0x3, 0x800, 0x8, 0x7fffffff, 0x1, 0xff, 0x4, 0x1, 0xda], 0x2, [{[0xad1, 0x8001], @local}, {[0x1, 0x6], @local}]}}}}, @physdev={{'physdev\x00', 0x0, 0x48}, {{'geneve1\x00', {0xff}, 'veth0_to_bridge\x00', {}, 0x4, 0x10}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x2, {0xffffffffffff0821}}}}], @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x68f8, {0x1}}}}}, {0x5, 0x20, 0x60, 'wg1\x00', 'netdevsim0\x00', 'ip6gre0\x00', 'veth0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0x1fe, 0xff, 0xff, 0x0, 0xff], 0x10e, 0x186, 0x1b6, [@rateest={{'rateest\x00', 0x0, 0x48}, {{'virt_wifi0\x00', 'wg0\x00', 0x1, 0x1, 0x3f, 0x5, 0x9, 0x7, {0xa2}, {0x2}}}}, @cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x6, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x8, 0x9, {0x3}}}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}]}]}, 0x12a4) sendmmsg$alg(r3, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) socketpair(0x2c, 0xa, 0x9f9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_PROTOCOL(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x1, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0c0}, 0x4000) [ 1452.525290][T25495] bridge227: port 1(bond0) entered disabled state [ 1452.573235][ T27] audit: type=1804 audit(1589144260.549:1879): pid=25515 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1306/cgroup.controllers" dev="sda1" ino=16211 res=1 [ 1452.708947][T25511] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1452.766546][T25513] bridge9: port 1(bond0) entered blocking state [ 1452.781709][T25513] bridge9: port 1(bond0) entered disabled state [ 1452.811632][T25513] device bond0 entered promiscuous mode [ 1452.835475][T25513] device bond_slave_0 entered promiscuous mode [ 1452.856913][T25513] device bond_slave_1 entered promiscuous mode [ 1452.881495][T25513] device bridge8 entered promiscuous mode [ 1452.908861][T25516] device bond0 left promiscuous mode [ 1452.920836][T25516] device bond_slave_0 left promiscuous mode [ 1452.952310][T25516] device bond_slave_1 left promiscuous mode [ 1452.971223][T25516] device bridge8 left promiscuous mode [ 1452.984803][T25516] bridge9: port 1(bond0) entered disabled state [ 1453.139674][T25500] netlink: 'syz-executor.2': attribute type 9 has an invalid length. 20:57:41 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x1fffffff0) 20:57:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6000}}, 0x20}}, 0x0) 20:57:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10018aad7) [ 1453.449331][T25566] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1453.526834][T25581] bridge227: port 1(bond0) entered blocking state [ 1453.538039][T25581] bridge227: port 1(bond0) entered disabled state [ 1453.587839][T25581] device bond0 entered promiscuous mode [ 1453.613479][T25581] device bond_slave_0 entered promiscuous mode [ 1453.629470][T25581] device bond_slave_1 entered promiscuous mode [ 1453.729229][T25585] device bond0 left promiscuous mode [ 1453.734643][T25585] device bond_slave_0 left promiscuous mode [ 1453.765903][T25585] device bond_slave_1 left promiscuous mode 20:57:41 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000001f80), 0xc00) bind$ax25(r0, &(0x7f0000001fc0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00fe80000000c1549e2e000000000000aafe8000000000000000000000000000aa242088be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 1453.787377][T25585] bridge227: port 1(bond0) entered disabled state 20:57:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@local, @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:57:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='memory.swap.current\x00', 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@gettfilter={0x44, 0x2e, 0x200, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x3, 0xfff3}, {0xffff, 0xfff2}, {0xffe0, 0xf}}, [{0x8, 0xb, 0x3}, {0x8, 0xb, 0x7c79}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0xfffffffb}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x40080d1) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000050002302bd7ce00c36d00000000"], 0x87a434fef1a37449}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000002) 20:57:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0xc00}}, 0x20}}, 0x0) 20:57:42 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00fe8000000000000000000000000000aafe80000000000000000000000000efa9242088be000100002200000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'veth1_to_batadv\x00', {0x2, 0x4e23, @broadcast}}) 20:57:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x10000f000) [ 1454.551853][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 1454.551866][ T27] audit: type=1804 audit(1589144262.599:1886): pid=25617 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir038938013/syzkaller.xATKCN/1449/cgroup.controllers" dev="sda1" ino=16195 res=1 20:57:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x1010, 0x464, 0x1, 0x70bd2d, 0x25dfdbfe, "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", ["", "", "", "", ""]}, 0x1010}}, 0x8080) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1454.669595][T25581] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1454.697453][T25615] bridge9: port 1(bond0) entered blocking state [ 1454.715917][T25615] bridge9: port 1(bond0) entered disabled state 20:57:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6558}}, 0x20}}, 0x0) [ 1454.749794][T25615] device bond0 entered promiscuous mode [ 1454.784741][T25615] device bond_slave_0 entered promiscuous mode [ 1454.805206][T25615] device bond_slave_1 entered promiscuous mode [ 1454.813067][ T27] audit: type=1804 audit(1589144262.859:1887): pid=25632 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1309/cgroup.controllers" dev="sda1" ino=16211 res=1 [ 1454.852946][T25615] device bridge8 entered promiscuous mode [ 1454.865321][T25619] device bond0 left promiscuous mode [ 1454.879366][T25619] device bond_slave_0 left promiscuous mode [ 1454.891884][T25619] device bond_slave_1 left promiscuous mode [ 1454.898938][T25619] device bridge8 left promiscuous mode [ 1454.905626][T25619] bridge9: port 1(bond0) entered disabled state [ 1455.032003][T25634] __nla_validate_parse: 1 callbacks suppressed [ 1455.032013][T25634] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1455.087598][T25635] bridge228: port 1(bond0) entered blocking state [ 1455.103387][T25635] bridge228: port 1(bond0) entered disabled state [ 1455.125303][T25635] device bond0 entered promiscuous mode [ 1455.131465][T25635] device bond_slave_0 entered promiscuous mode [ 1455.137871][T25635] device bond_slave_1 entered promiscuous mode [ 1455.147734][T25636] device bond0 left promiscuous mode [ 1455.156517][T25636] device bond_slave_0 left promiscuous mode [ 1455.172756][T25636] device bond_slave_1 left promiscuous mode [ 1455.182243][T25636] bridge228: port 1(bond0) entered disabled state 20:57:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:43 executing program 2: syz_emit_ethernet(0x13c, &(0x7f0000000140)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x106, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x1ff, 0x1]}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x4}}}, {0x8, 0x6558, 0x0, "105fed13d8645a4657fed1cc22c207a2f389fb28ef6896b7fcff2ed454894e3f8adeb234ebf8ba00e9d6a9026cc0eb592aed5ee46f58bf2e572eebfe09424acbf9705f6e63a4da534f6f5217aa9a136e450cce9eddcd2608ed39ee97767d2774f1eed026d0a7cbc085b131ed792e772a23545e4fe8316fc1f2d0821c784feabb483eaca252c0abbad1edc82de86bf8860b13cf452b76e99f3f51f11b239d9b9aed58855f24fdb5dcfb6231fa48167c19de3f166cb992bccc454c436e4d"}}}}}}}, 0x0) 20:57:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6000}}, 0x20}}, 0x0) 20:57:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000050}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:57:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x1010, 0x464, 0x1, 0x70bd2d, 0x25dfdbfe, "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", ["", "", "", "", ""]}, 0x1010}}, 0x8080) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1455.376534][T25636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6800}}, 0x20}}, 0x0) [ 1455.524489][T25664] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:57:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0xffb5, 0x2f, 0x0, @initdev={0xfe, 0x88, [], 0xfc, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}}, 0x0) [ 1455.585049][ T27] audit: type=1804 audit(1589144263.629:1888): pid=25660 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1310/cgroup.controllers" dev="sda1" ino=16195 res=1 [ 1455.613875][T25666] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1455.667327][T25669] bridge6: port 1(bond0) entered blocking state [ 1455.684142][T25669] bridge6: port 1(bond0) entered disabled state [ 1455.716229][T25669] device bond0 entered promiscuous mode [ 1455.742701][T25669] device bond_slave_0 entered promiscuous mode [ 1455.752452][T25669] device bond_slave_1 entered promiscuous mode 20:57:43 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="00000000ec812a28428a7e72c06208706d76ec7127ed70f707113967eb13c871466d565075fe7d9bd7c02bed13c73740448e4d5ec244494016df274be22c2c979f56b4dbc6513c5f8c5c022927f7f56315b820d96779c0f38ebdf4fd", @ANYRES16=r1, @ANYBLOB="00002bbd7000fddbdf250a000000080004000c040000040003801800028014000100ff0200000000000000000000000000010c00018008000900760000000800050000feffff0800060008000000"], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYRES16=r1, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049"], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r2 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000480)={0x0, 0xfb, 0x0, 0x5}, 0x10) read(r0, &(0x7f00000002c0)=""/129, 0x81) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x14f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x176529bc}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4008040}, 0x4040000) [ 1455.779322][T25672] bridge229: port 1(bond0) entered blocking state [ 1455.790882][T25672] bridge229: port 1(bond0) entered disabled state [ 1455.797517][ T27] audit: type=1804 audit(1589144263.839:1889): pid=25665 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/982/cgroup.controllers" dev="sda1" ino=16273 res=1 [ 1455.854045][T25672] device bond0 entered promiscuous mode [ 1455.862285][T25672] device bond_slave_0 entered promiscuous mode [ 1455.870905][T25672] device bond_slave_1 entered promiscuous mode [ 1455.895492][T25674] device bond0 left promiscuous mode [ 1455.903652][T25674] device bond_slave_0 left promiscuous mode [ 1455.913996][T25674] device bond_slave_1 left promiscuous mode [ 1455.921284][T25674] bridge6: port 1(bond0) entered disabled state 20:57:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000070601040004000000000000000100"/28], 0x87a434fef1a37449}, 0x1, 0x0, 0x0, 0x20044005}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1456.052004][T25681] device bond0 left promiscuous mode [ 1456.066455][T25681] device bond_slave_0 left promiscuous mode 20:57:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100007000) [ 1456.081785][ T27] audit: type=1804 audit(1589144264.129:1890): pid=25697 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1311/cgroup.controllers" dev="sda1" ino=16195 res=1 [ 1456.091803][T25681] device bond_slave_1 left promiscuous mode [ 1456.114153][T25694] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1456.167228][T25681] bridge229: port 1(bond0) entered disabled state [ 1456.378757][ T27] audit: type=1804 audit(1589144264.419:1891): pid=25699 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/983/cgroup.controllers" dev="sda1" ino=16273 res=1 20:57:44 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000511d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) socket$tipc(0x1e, 0x5, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2004c004}, 0x41) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) [ 1456.599706][T25707] IPVS: ftp: loaded support on port[0] = 21 20:57:44 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'veth1\x00', {0x2, 0x4e24, @broadcast}}) socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0xfffffffffffffce7, &(0x7f0000007640)={&(0x7f0000000200)=ANY=[], 0x4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x1bccad31) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000240)={0x2, 'veth1_vlan\x00', {0x878}}) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r5}, 0x30) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000140)={@private, @empty, 0x0}, &(0x7f0000000180)=0xc) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000200)={r6, 0x1, 0x6, @random="7d81864183d8"}, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="00fa84b8152aefd98debcb5e0b7d61770429bd0300000073ff902417b6e90000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) [ 1456.846251][ T27] audit: type=1804 audit(1589144264.879:1892): pid=25697 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1311/cgroup.controllers" dev="sda1" ino=16195 res=1 [ 1457.011634][T25666] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1457.425404][T25709] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 1457.783230][T25707] netdevsim0 speed is unknown, defaulting to 1000 20:57:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000000601040000000000000000000080000500010007000000108854b35c64f7f233da2cd7024153aed8a0b94dd78e708e5985f5077b0cbc93d585002e43e95355e3a3043c11482c8d8732f556c729"], 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 20:57:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) 20:57:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6c00}}, 0x20}}, 0x0) [ 1458.054993][T25755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1458.074526][ T27] audit: type=1804 audit(1589144266.109:1893): pid=25762 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1312/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1458.148147][T25766] bridge229: port 1(bond0) entered blocking state [ 1458.170871][T25766] bridge229: port 1(bond0) entered disabled state [ 1458.199212][T25766] device bond0 entered promiscuous mode [ 1458.231285][T25766] device bond_slave_0 entered promiscuous mode [ 1458.259341][T25766] device bond_slave_1 entered promiscuous mode [ 1458.297055][T25769] device bond0 left promiscuous mode [ 1458.302762][T25769] device bond_slave_0 left promiscuous mode [ 1458.331860][T25769] device bond_slave_1 left promiscuous mode [ 1458.360725][T25769] bridge229: port 1(bond0) entered disabled state 20:57:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r2, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x7fff}, 0x4) setsockopt$inet_mreqsrc(r3, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r5, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ppoll(&(0x7f0000000140)=[{r2}, {r3, 0x200}, {r4, 0x1150}, {r5, 0x200}], 0x4, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200), 0x8) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000c1570601040000000000000000000000000500010007000000"], 0x87a434fef1a37449}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, r1, 0x0, 0x100000002) r7 = openat$cgroup_ro(r0, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f00000000c0)) 20:57:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) [ 1458.612961][ T27] audit: type=1804 audit(1589144266.650:1894): pid=25782 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1313/cgroup.controllers" dev="sda1" ino=16379 res=1 20:57:46 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) getsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1458.755089][ T0] NOHZ: local_softirq_pending 08 20:57:46 executing program 2: r0 = socket(0x1000000010, 0x0, 0x81) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/10, 0xa}, {&(0x7f0000000040)=""/27, 0x1b}], 0x2, &(0x7f00000000c0)=""/37, 0x25}, 0xa0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r2, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000002100010100000000000000000200000000000000000000000ce117006e19910e3b435b9d254b3935e28d084a335a59e06476c60595f95f06463a0b6a899c0bcf0558dff473543b1c976ada08d6cfe3ea463abebc9212e21af063fd46515848fe85458f4e363b170dee381ff98548be7d7858c5eae862f0bed925d0d11cc23b882015e70769f10d20a428f1d3a87f1045874c3b2b0eb84313fc7267a7bced2cc0", @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in6=@mcast2, 0x4e24, 0x1, 0x4e22, 0x4e6, 0x2, 0x80, 0x20, 0x3a, 0x0, r5}, {0x5, 0x6, 0xa99, 0x3, 0xff, 0x0, 0x7, 0x5}, {0x6, 0x7, 0x5, 0xe5}, 0x1, 0x6e6bc0, 0x1, 0x0, 0x2, 0x1}, {{@in=@multicast1, 0x4d4, 0xff}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x4, 0x2, 0x20, 0x10000, 0x7, 0x5}}, 0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000200)={0x3, @default, r5}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, r2, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r6}, 0x30) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[@ANYRESOCT], 0x0) [ 1458.941024][T25755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:57:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000005c0)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x7, 0x7, 0x200, 0x8, 0x10, 0x1000, 0x5}, &(0x7f0000000680)=0x9c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000006c0)={r5, 0x20}, &(0x7f0000000700)=0x8) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r6, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000180)={0x8, 0x1, [], [@jumbo, @pad1, @jumbo]}, 0x18) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e20, @remote}}) sendfile(r3, r1, 0x0, 0x100000002) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@gcm_128={{}, "8aec7f5b6bae59d9", "eaaacc2be03d866da988e3504383bef9", "25d58bea", "01eab34817245567"}, 0x28) [ 1459.244295][ T27] audit: type=1804 audit(1589144267.280:1895): pid=25808 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1314/cgroup.controllers" dev="sda1" ino=16379 res=1 20:57:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x64}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 1459.674248][ T27] audit: type=1804 audit(1589144267.710:1896): pid=25838 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858904023/syzkaller.Cnaqj7/985/cgroup.controllers" dev="sda1" ino=16382 res=1 20:57:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x6c00}}, 0x20}}, 0x0) 20:57:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x7400}}, 0x20}}, 0x0) 20:57:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a7ee6f", 0x30, 0x3a, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "84dcc0", 0x0, 0x32, 0x0, @rand_addr=' \x01\x00', @mcast1}}}}}}, 0x62) [ 1459.854326][T25843] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1459.859119][ T21] tipc: TX() has been purged, node left! [ 1459.933088][T25845] bridge230: port 1(bond0) entered blocking state [ 1459.944432][T25845] bridge230: port 1(bond0) entered disabled state [ 1459.983398][T25845] device bond0 entered promiscuous mode [ 1460.003755][T25845] device bond_slave_0 entered promiscuous mode [ 1460.031878][T25845] device bond_slave_1 entered promiscuous mode [ 1460.057375][ T27] audit: type=1804 audit(1589144268.090:1897): pid=25808 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1314/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1460.099924][T25843] device bond0 left promiscuous mode [ 1460.105412][T25843] device bond_slave_0 left promiscuous mode [ 1460.127090][T25843] device bond_slave_1 left promiscuous mode [ 1460.154299][T25843] bridge230: port 1(bond0) entered disabled state [ 1460.167784][ T27] audit: type=1804 audit(1589144268.090:1898): pid=25809 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1314/cgroup.controllers" dev="sda1" ino=16379 res=1 20:57:48 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x6, &(0x7f0000000100)=0xf5ee, 0x8) 20:57:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x7) [ 1460.359571][T25858] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1460.460573][T25859] bridge6: port 1(bond0) entered blocking state [ 1460.466899][T25859] bridge6: port 1(bond0) entered disabled state [ 1460.495437][T25859] device bond0 entered promiscuous mode 20:57:48 executing program 2: syz_emit_ethernet(0xdf, &(0x7f0000000100)={@random="b7e095637cba", @remote, @val={@void, {0x8100, 0x5}}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0xa5, 0x2f, 0x0, @local, @local, {[@srh={0x6c, 0xa, 0x4, 0x5, 0x0, 0x50, 0x4, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x32}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={[], [], @rand_addr=0x64010102}]}, @fragment={0x48, 0x0, 0x9, 0x0, 0x0, 0x6, 0x67}], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r1, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r1, 0x0) r2 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) connect$caif(r2, &(0x7f0000000200), 0x18) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r3, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r4}, 0x30) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1460.515036][T25859] device bond_slave_0 entered promiscuous mode [ 1460.540688][T25859] device bond_slave_1 entered promiscuous mode 20:57:48 executing program 1: socket$netlink(0x10, 0x3, 0x8000000004) socketpair(0x1d, 0x80000, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x38, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x38}, 0x1, 0x0, 0x0, 0x4800}, 0x40000) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x5, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in6=@local}, {@in6=@rand_addr=' \x01\x00', 0x0, 0x33}}, 0xfffffffd}}, 0xf8}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000040)={r8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000180)={r8, 0x9, 0x35, "5a4e9d41eb4d9b112df88b50e4d5aade65e4964c8534746be38cab4b52d288d0f352c57d8873240eed0fbdfb5468613e733b5ddaec"}, 0x3d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={r8, @in={{0x2, 0x4e24, @loopback}}, [0x6c46, 0x2c, 0x1, 0xe94, 0x8eb, 0x4, 0x2, 0x5, 0x6ae2, 0x5, 0xff, 0x5, 0x0, 0x3, 0x1]}, &(0x7f00000003c0)=0x100) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={r9, 0x7}, &(0x7f0000000440)=0x8) [ 1460.597053][ T27] audit: type=1804 audit(1589144268.630:1899): pid=25871 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1315/cgroup.controllers" dev="sda1" ino=16379 res=1 20:57:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x87a434fef1a37449}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000003) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000d80)=ANY=[@ANYBLOB="60a10e24fe29ee7dc007c4f16c91897d5db0a485e7cb466edb156ebfc5d65c35b116096f3fd8765a0851842212b95fbffdd60f7b7f0e9b9dad66c992035f2681b6e3e72a0bdfa31d3564551a8823d8e88bec055c516aff4a3aa20b9d196e43bbe3fec6a25b1bf295cd37222e0e9494fb25afffb5dcfe107e134fe1e0cd887ee3a0713d401c7942b89fc41d646dd8188d80a7bc1d4d4f0ad2ac88439a43ea48fe510cae29a7965a33c00a425f2c867c6c24dc1900ac0d92be57c9d72ba92c740618fdd77eb59174fcf4b177fef8c271f5fe", @ANYRESOCT=r1, @ANYRESDEC=r2], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r4, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r4, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) pwritev(0xffffffffffffffff, &(0x7f0000000c00)=[{&(0x7f0000000200)="074e7fdceac4107ac996db98e779daf48bdb6ac012c62bc05a185588a7a0ded0959d0de97a19110775336b80f5db792e15a9cea7521f0c07f7683be068d24de16b932643a811c48b787e411ae21097987a724f8583eac30b166190cca49c1da5c0", 0x61}, {&(0x7f0000000180)="d010fb856b5ec34a391bd2baefd416", 0xf}, {&(0x7f0000000440)="162c42fd323c94a5f115b793f83a88d2bdce884131c867f6ae3cadc3d4f0d79cf9079f8a0b873ee6905b5b79a8a139ba6f16fe306bd142b7e7a391238834afd9230de4f4e4a64c4aaacf7bdb598fd9b766444fce5e0d8fb5f148da473f4136eb727e8511c2024b218a7f7189d39afe345acde7aeaf571aab78e1a217a184b3c8cc9becf457c108e3eca28079eae3611468c1e74d419b7f5b90efe2", 0x9b}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000000500)="942fe409c8e970025a3c42a1d1dfba8a00159824c7591ea49fad05984081cf16d00861446fa1c7ebaeef28a2da73b9753f501d382555c1ede34eaaf9473c43d9a59ff2be715ab9c83dc1a9cf2e5d11e77a01b74d7dc1e8eb29f0fe7d792e683199820930807561e43f598931c9ac50f8a7ce448c491e7e4070a7dbaede81759fa2afa2db619b37d5dc2af6f3b79dffb8b97413d190912943ac1275b7212bf1d10aadf0d6a358fb592f51fab2bfa01b71444c406362a313bba9caa96f920c0153c86581b162a643e027a2cbc5d74252ff33a7e8d811efa2af0643b6448ac701f086e5a122ccf09d01eabaee8b00b7530677c5bfdd4cd6", 0xf6}, {&(0x7f0000000280)="1e1c7f3a84215e370dee77e803d0b677dc27776ca34801ccb28094d4c0e6e2c76d5c30ff3f9a752e879911ee6155", 0x2e}, {&(0x7f0000000600)="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", 0xfa}, {&(0x7f00000002c0)="9d50e7", 0x3}], 0x8, 0x3) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012e400300000000006506020001cd00007118540000000000c3640000000000006a0a00fe00000000850000002e00009ff8894c00b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917ad4b200000000000000000beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc3996792043a6787bac46aa712f2e6388f3286c69669622208266f896ba2c9e73c2efeec2dc565fbafb2cb63f5fef9ab79ff8abaa8a08f54a062107e9bb3e980fff675c8d3e91df6648a7a6aebcb63e0867b75690152af27711f0dcb9c06018d21bf3f87b8eb65323b4267a526d53442db8e48dbc5ce47d67d07441a7975d5e41b14fc0154a8246249952a8b61633ce068220defe09d3b1136af6d03e9cf996c13d1bfcdc54567a9ca80dec2e943fe4ae7c617cc071f7add70cfbd48f8f6b50fe68a4ea6c213839152641dfa686c4da6a8297d88efa73e7e601040000b4a685969f28902bdecf66ef39755de79ed2c711477febc96231a53984d00877301d0ec62427a8e3a118fdd1ce9aaed569ebc5f2e58d6028e66139a737cc7146a131d47dcebb32ed67021d76e983223c998aec22242ae54e87f438d26982876b58f9134366952f7399a733f07138a7369257fcc7d86f2ce97f0c117ec439c6b7b965752bbc06eced08d97a32ae4b1ad4d11c5b6fdf5f841975233e4cea13f3ef04b2cab9cc256d4539dbafd888c7097c1169e0bebcc81ca3b740e663fbddcf91c50f1fda40bf34b6c9c1da2d6ed8acaf2a8091820ff4cf6be74ddca8bf2eed0e11b2139e8c3ec95436af5269d5792decda7d8f5dcf8640b504ba23c6d0a739aeab115cb9f9cdbf9319a56f0f9cee17deecf747f3493f1dc3c9a40b3e93fa80b8234ccbf39a9ef09bd97321f0dc20956f44ba2c5ec2e7569b05cf4690ddc189f174046a8b214acf23f42fb51ed4819e6b4cb5a8bf2b559d0c198fe0315483b8beb9801d06c58b22dd713fe3b7ef18e21081aacfd091b754125a488cea18255f79bebcb3051f622f8a1d9af1908e88a58774a24f35a4ccdbedea6212286c23dd89c2b4b90647f17231472af8dda7f3ab20f093aad3ce875f7458a59ee6d0a52aeb7bc8ebf1798515fc5de3f1bae8b4e9393f73960a9d5ce557523d056a5e7725531c5485278e0362338e2e2710fe00465e0d182a3220e1d25b50d6904fa799500d29ee91022cf5b814eeb9b3cab21196d0b6fe5525285eea359274f1f21d69233bbe94941f10ba292100000000000000000000000000000000c18e93a0c5231779f2ee201e9fe7e63e84b57b5f05ecb594b8255b3085b352ca9533d6c31c1a30158c30352f8a126a65cb6582e58aa641007418611df53a601c3a8fb8d2286e86abf98136f345446730f68f5d6d1817a9e1b09e5650d2519fbe719a45337d2deb3fef5f7f565457660dec6fe903a1c2ea4f40a8ea1c179892afa219fc69a44163f0d731de418e9fd82a8c4661caea674b19242d1840d047882f640ea248457288c5ffb63e857da03ff5c047e0062bf55cd228f4dc42e9a4426e9d24a20a38b18bff9f14267dd8ce232e8b007fbd8d5e824b4db4cef53cd96f6140f539d81cf18b14483a8d95029386bc3ffd1e733a6e7f73ec898fea9511740e0445f89c70d59826059695f48ce19ccbfa52c0be40c310b56dbe5e2a23"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r5, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r4, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r6}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r4, 0x16, 0x1, 0x80000000, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) [ 1460.853386][ T27] audit: type=1804 audit(1589144268.890:1900): pid=25885 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1316/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1461.196145][T25862] device bond0 left promiscuous mode [ 1461.201775][T25862] device bond_slave_0 left promiscuous mode [ 1461.208347][T25862] device bond_slave_1 left promiscuous mode [ 1461.222561][T25862] bridge6: port 1(bond0) entered disabled state [ 1461.384840][T25875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1461.429533][T25878] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1461.468917][T25845] bridge230: port 1(bond0) entered blocking state [ 1461.477028][T25845] bridge230: port 1(bond0) entered disabled state [ 1461.502329][T25845] device bond0 entered promiscuous mode [ 1461.521479][T25845] device bond_slave_0 entered promiscuous mode [ 1461.542604][T25845] device bond_slave_1 entered promiscuous mode [ 1461.570187][T25880] device bond0 left promiscuous mode [ 1461.579531][T25880] device bond_slave_0 left promiscuous mode [ 1461.598855][T25880] device bond_slave_1 left promiscuous mode [ 1461.620658][T25880] bridge230: port 1(bond0) entered disabled state [ 1461.719007][ T27] audit: type=1804 audit(1589144269.750:1901): pid=25887 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1316/cgroup.controllers" dev="sda1" ino=16379 res=1 20:57:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x101, @private2, 0x6}}, 0x0, 0x0, 0x2c0, 0x8001, 0x92, 0x1}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='^]userkeyring\x00', r3}, 0x30) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r4, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000280)={r4, 0x3f, 0xf441}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_MSG_GETFLOWTABLE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x17, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x1) sendto$inet6(r0, &(0x7f0000000100)="d97f261a3958", 0x6, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) [ 1461.813932][T25882] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:57:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_DELOBJ={0x78, 0x14, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELSETELEM={0x5e8, 0xe, 0xa, 0x301, 0x0, 0x0, {0xe, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x590, 0x3, 0x0, 0x1, [{0x334, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x234, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd6, 0x1, "ae243ba40fa5bdc4142441028e58c410f511535997fa35dd74ea04a64eac482270ec1fb3662171db5661602014353917881b9652535ae093043d54c297b8681b6119d9d5b13559a1390ff746a560ceea619906843b14ea3272c170e3aab0f08418ac602b85e667cfb7d4ba04211f31d6866bb3bb1eac32f4774de0a51baee6e4e220ba0e8110a2369c1f35a60cc9cd7c999c4ad8bf2cebe86d90e532ae15cab3cb3b37d7d9d9eea85c4ea730b13c5db5b36cc524dadb6acd4f73b6b2b3204a8e2480cd0b2a4ca298185dba75c0359c22af7e"}, @NFTA_DATA_VALUE={0xbe, 0x1, "da6d1037a5a1365cbe1b722da0845bd7c3b103f961539aaafaf71f7497dacf8153b3a4524e0d5a96610bf39c0761f291937d2a3175022fe4eece2fac44d68954490bb85910878ebe064ada02804374afadbf26f0587adf816d2d4a5c17d724e27e131c7fb957939cdfa5f063ac4534e647e35da9604926dcfe6ddb159306974ad35e291fd32aabfd1ae7713d8aefaa4adbdd02233ab0101f9325dd3d8816daf23989b91c03329e61b89b7dbc1f16c70d19186364ad2a5fc19322"}, @NFTA_DATA_VALUE={0x45, 0x1, "79e87f721fcc0a1bfc7d319bbe3fe26a9759f8ac245c49d750cecdf5248fdf5b58475eac1de1c07f03003d138e21b0e0e9742e2db71a1cb8ecb372b864137f7e9a"}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x71, 0x6, 0x1, 0x0, "21f91ca331e46f424e213eb944f9ad05a928208f7f8647f71d52146adf1ef4fc83d000cc58462de7bf52d4d9914a5fe53578592174ec1482a41cd4013a11ebba51caac6e1561b877973ba10e6e410938c0cd1f34e08351cf82d3800bb3d9445efaf230539aa9cd513c49267c4e"}, @NFTA_SET_ELEM_KEY={0x78, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x72, 0x1, "dbfb1d1646c0db6cf74813a32e4850702f24d2eeb76bb402026cafa971552b083ca25d15e16283b1fa52dc8c5e972f134b7fcb4eb746eab6bb5bc0c115282ec9194adb9effffd8a6c1f4c8064a1c9ecf21827692e95904281d1580d597acd42e91a7e6983fa7af214d728ef7ebce"}]}]}, {0x258, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x17c, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x26, 0x1, "28fe314127ec55c1d39e6786be0f4760478516c732044678dbd489b4688a1079abdf"}, @NFTA_DATA_VALUE={0x65, 0x1, "81ebd29379e79a92c84c0b8953b5cecb0423b371aa953b4256b4dfcd2e51c1d7c70bd64ba66217b1880aa231e756c143a514b7276f723f055641ece970c24cac707ade5bd1dccbaf0340ad5510f01b83dc704470196224e4d929cb6db19a164be6"}, @NFTA_DATA_VALUE={0x48, 0x1, "43f2442db7818b4eabed02a77a8f024f7eebd15326408d5c59f34d322e2b77536d34748760ee8269b77e9820e82f4fb16ab070e26773db7287cf2f41912ec7743a609221"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x6}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x5, 0x1, 'm'}, @NFTA_DATA_VALUE={0x76, 0x1, "ae70b5223f4cc4510d2d84e602ace6b35798db14b1a4f98c00d4406d1ade33847b08c825ca6d1c1cb384bd243382853716eded9455f2e07adda3e93e0fed0652512634b3eb1d2a8ce50cd5066d3ccc822e14f3cad0a1d54d8c47e19255255e6a86ed491810d8885577bb6049469c96b1c061"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3fe}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY={0xa4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x9e, 0x1, "e06018f47f3ea23cdc18575c170932079a8a1ffa3f942f794e2978272db67ffbfa26ee402761a54d7c5be8d232c9b6818bfb902cbed0388adb1b541b9d1d8d4bddbafb3cff19b797afaf1e98343342152f06eb62e8d9a27384c6b86b37416f38cbe492f24270d0f2fe5f04815761b6dcc066b69fd9fba884122356b2b01bf6c2525698b4ba7398c2924af0df3d3b60a9166461cd4de8829df24b"}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELSET={0xc8, 0xb, 0xa, 0x401, 0x0, 0x0, {0xae222ba5d8357fa7, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xa}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x1000}, @NFTA_SET_USERDATA={0x44, 0xd, 0x1, 0x0, "9e3af780c9d7ed609f93734c3c5ac36ad0f7738118d8780f371a7320d844792b9980e8678e6e979a7b530cfed54b696abb2567946380822c0f83867b720cf0cc"}, @NFTA_SET_USERDATA={0x29, 0xd, 0x1, 0x0, "bea45782fe924baafd679c963752c0d058cc2c424b2cdb6665245c996f6a4ed6c20d04c5b6"}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x1c, 0x5, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}]}], {0x14}}, 0x76c}, 0x1, 0x0, 0x0, 0x841}, 0x8011) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xfffffffd, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x2}]}}}]}, 0x3c}}, 0x0) 20:57:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)=ANY=[@ANYBLOB="b7e095637cbaea1ea186530d86dd60eaa83600452f00fe8000000000000000000000000000aafe800000000000000000000000000022000008000000000100000000000000080022eb0000000020000000020000000000000000000000080065580000000000000101000000000000000000"], 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/77, &(0x7f0000000080)=0x4d) 20:57:50 executing program 2: syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3a}}, {0x2, 0x4e20, @private=0xa010100}, {0x2, 0x4e21, @local}, 0x282, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)='veth0\x00', 0x3, 0x3, 0xffff}) [ 1462.217046][ T27] audit: type=1804 audit(1589144270.250:1902): pid=25898 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir473933029/syzkaller.lIiqb4/1316/cgroup.controllers" dev="sda1" ino=16379 res=1 [ 1462.258787][T25918] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 1462.270515][T25918] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1462.278928][T25918] CPU: 0 PID: 25918 Comm: syz-executor.1 Not tainted 5.7.0-rc4-syzkaller #0 [ 1462.287587][T25918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.297734][T25918] RIP: 0010:erspan_validate+0x89/0x380 [ 1462.303179][T25918] Code: c1 ea 03 80 3c 02 00 0f 85 c5 02 00 00 4c 8b a3 b0 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 04 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 9c 02 00 00 [ 1462.323893][T25918] RSP: 0018:ffffc90005307188 EFLAGS: 00010247 [ 1462.329958][T25918] RAX: dffffc0000000000 RBX: ffff8880930ae800 RCX: ffffc9000af40000 [ 1462.337908][T25918] RDX: 0000000000000000 RSI: ffffffff86b2a77a RDI: 0000000000000004 [ 1462.345863][T25918] RBP: 0000000000000000 R08: ffff88806e41e3c0 R09: ffffffff88e66722 [ 1462.353815][T25918] R10: ffff8880930ae8c7 R11: ffffed1012615d18 R12: 0000000000000000 [ 1462.361769][T25918] R13: ffffc90005307888 R14: ffffc90005307428 R15: dffffc0000000000 [ 1462.370766][T25918] FS: 00007f8837045700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1462.379759][T25918] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1462.386336][T25918] CR2: 000000000071a047 CR3: 000000004edb9000 CR4: 00000000001406f0 [ 1462.394289][T25918] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1462.402239][T25918] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1462.410186][T25918] Call Trace: [ 1462.413467][T25918] ? ipgre_tap_validate+0x240/0x240 [ 1462.418659][T25918] __rtnl_newlink+0x526/0x1590 [ 1462.423411][T25918] ? rtnl_link_unregister+0x240/0x240 [ 1462.428769][T25918] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1462.434820][T25918] ? is_bpf_text_address+0xcb/0x160 [ 1462.439997][T25918] ? kernel_text_address+0x6e/0xe0 [ 1462.445083][T25918] ? __kernel_text_address+0x9/0x30 [ 1462.450262][T25918] ? unwind_get_return_address+0x5a/0xa0 [ 1462.455889][T25918] ? profile_setup.cold+0xc1/0xc1 [ 1462.460942][T25918] ? arch_stack_walk+0x84/0xd0 [ 1462.465703][T25918] ? stack_trace_save+0x8c/0xc0 [ 1462.470542][T25918] ? stack_trace_consume_entry+0x160/0x160 [ 1462.476349][T25918] ? rtnl_newlink+0x46/0xa0 [ 1462.480841][T25918] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1462.486374][T25918] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1462.492337][T25918] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1462.498129][T25918] rtnl_newlink+0x64/0xa0 [ 1462.502439][T25918] ? __rtnl_newlink+0x1590/0x1590 [ 1462.507445][T25918] rtnetlink_rcv_msg+0x44e/0xad0 [ 1462.512393][T25918] ? rtnl_bridge_getlink+0x870/0x870 [ 1462.517661][T25918] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 1462.522926][T25918] ? __copy_skb_header+0x250/0x5b0 [ 1462.528019][T25918] ? skb_splice_bits+0x1a0/0x1a0 [ 1462.532937][T25918] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1462.538720][T25918] ? kmem_cache_alloc+0x261/0x740 [ 1462.543730][T25918] netlink_rcv_skb+0x15a/0x410 [ 1462.548477][T25918] ? rtnl_bridge_getlink+0x870/0x870 [ 1462.553862][T25918] ? netlink_ack+0xa10/0xa10 [ 1462.558460][T25918] netlink_unicast+0x537/0x740 [ 1462.563246][T25918] ? netlink_attachskb+0x810/0x810 [ 1462.568340][T25918] ? _copy_from_iter_full+0x25c/0x870 [ 1462.573693][T25918] ? __phys_addr_symbol+0x2c/0x70 [ 1462.578701][T25918] ? __check_object_size+0x171/0x437 [ 1462.583977][T25918] netlink_sendmsg+0x882/0xe10 [ 1462.588727][T25918] ? aa_af_perm+0x260/0x260 [ 1462.593210][T25918] ? netlink_unicast+0x740/0x740 [ 1462.598129][T25918] ? netlink_unicast+0x740/0x740 [ 1462.603048][T25918] sock_sendmsg+0xcf/0x120 [ 1462.607447][T25918] ____sys_sendmsg+0x6bf/0x7e0 [ 1462.612192][T25918] ? kernel_sendmsg+0x50/0x50 [ 1462.616857][T25918] ___sys_sendmsg+0x100/0x170 [ 1462.621517][T25918] ? sendmsg_copy_msghdr+0x70/0x70 [ 1462.626614][T25918] ? __fget_files+0x32f/0x500 [ 1462.631272][T25918] ? ksys_dup3+0x3c0/0x3c0 [ 1462.635679][T25918] ? __fget_light+0x20e/0x270 [ 1462.640334][T25918] __sys_sendmsg+0xec/0x1b0 [ 1462.644818][T25918] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1462.649887][T25918] ? __x64_sys_futex+0x380/0x4f0 [ 1462.654816][T25918] ? trace_hardirqs_off_caller+0x55/0x230 [ 1462.660517][T25918] ? do_syscall_64+0x21/0x7d0 [ 1462.665177][T25918] do_syscall_64+0xf6/0x7d0 [ 1462.669683][T25918] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1462.675551][T25918] RIP: 0033:0x45c829 [ 1462.679496][T25918] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.699097][T25918] RSP: 002b:00007f8837044c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 20:57:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x800, 0x70bd25, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x810}, 0xc094) syz_emit_ethernet(0x7b, &(0x7f0000000240)={@random="b7e095637cba", @random="ea1ea186530d", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eaa836", 0x45, 0x2f, 0x0, @local, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x88be, 0x1, 0x0, [], '\"'}}}}}}}, 0x0) 20:57:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000140000000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x8100, r6, 0x7a00}}, 0x20}}, 0x0) [ 1462.707494][T25918] RAX: ffffffffffffffda RBX: 0000000000500ce0 RCX: 000000000045c829 [ 1462.715448][T25918] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1462.723401][T25918] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.731444][T25918] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1462.739415][T25918] R13: 0000000000000a04 R14: 00000000004ccbcc R15: 00007f88370456d4 [ 1462.747374][T25918] Modules linked in: [ 1462.796990][T25918] ---[ end trace feb012609cb260f8 ]--- [ 1462.803043][T25918] RIP: 0010:erspan_validate+0x89/0x380 [ 1462.821235][T25918] Code: c1 ea 03 80 3c 02 00 0f 85 c5 02 00 00 4c 8b a3 b0 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 04 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 9c 02 00 00 [ 1462.872496][T25918] RSP: 0018:ffffc90005307188 EFLAGS: 00010247 [ 1462.889177][T25918] RAX: dffffc0000000000 RBX: ffff8880930ae800 RCX: ffffc9000af40000 [ 1462.897231][T25918] RDX: 0000000000000000 RSI: ffffffff86b2a77a RDI: 0000000000000004 [ 1462.928836][T25918] RBP: 0000000000000000 R08: ffff88806e41e3c0 R09: ffffffff88e66722 [ 1462.936840][T25918] R10: ffff8880930ae8c7 R11: ffffed1012615d18 R12: 0000000000000000 [ 1462.950655][T25918] R13: ffffc90005307888 R14: ffffc90005307428 R15: dffffc0000000000 [ 1462.959186][T25918] FS: 00007f8837045700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1462.968152][T25918] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1462.976504][T25918] CR2: 000055efc8d199c0 CR3: 000000004edb9000 CR4: 00000000001406f0 [ 1462.985295][T25918] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1462.993375][T25918] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1463.001403][T25918] Kernel panic - not syncing: Fatal exception [ 1463.008342][T25918] Kernel Offset: disabled [ 1463.012679][T25918] Rebooting in 86400 seconds..