3239.759206] device bridge2553 entered promiscuous mode [ 3239.777664] bond1426: Enslaving bridge2553 as an active interface with an up link 04:00:54 executing program 1 (fault-call:6 fault-nth:8): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3239.830064] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x27000000}) [ 3239.873153] audit: type=1800 audit(1583640054.990:880): pid=5934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16621 res=0 [ 3239.906079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pig=5938 comm=syz-executor.4 04:00:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000023030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3239.977880] bond1426: Enslaving bridge2554 as an active interface with a down link 04:00:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19b6, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3240.053108] FAULT_INJECTION: forcing a failure. [ 3240.053108] name failslab, interval 1, probability 0, space 0, times 0 [ 3240.125757] CPU: 1 PID: 6009 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3240.133593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3240.142952] Call Trace: [ 3240.145546] dump_stack+0x188/0x20d [ 3240.149187] should_fail.cold+0xa/0x1b [ 3240.153084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3240.158203] __should_failslab+0x115/0x180 [ 3240.162444] should_failslab+0x5/0xf [ 3240.166158] kmem_cache_alloc+0x29f/0x710 [ 3240.170329] ? rcu_read_lock_sched_held+0x10a/0x130 [ 3240.175356] selinux_file_alloc_security+0xaf/0x190 [ 3240.180376] security_file_alloc+0x5c/0xa0 [ 3240.184617] __alloc_file+0xc9/0x330 [ 3240.188355] alloc_empty_file+0x6d/0x170 [ 3240.192430] path_openat+0xf2/0x4200 [ 3240.196151] ? __lock_acquire+0x6ee/0x49c0 [ 3240.200388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.205761] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3240.210441] ? __lock_is_held+0xad/0x140 [ 3240.214538] do_filp_open+0x1a1/0x280 [ 3240.218349] ? may_open_dev+0xf0/0xf0 [ 3240.222155] ? find_held_lock+0x2d/0x110 04:00:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x28000000}) [ 3240.226223] ? __alloc_fd+0x43c/0x550 [ 3240.230044] ? lock_downgrade+0x740/0x740 [ 3240.234201] ? __lock_is_held+0xad/0x140 [ 3240.238274] ? do_raw_spin_unlock+0x171/0x260 [ 3240.242769] ? _raw_spin_unlock+0x29/0x40 [ 3240.246900] ? __alloc_fd+0x43c/0x550 [ 3240.250701] do_sys_open+0x3c0/0x500 [ 3240.254408] ? filp_open+0x70/0x70 [ 3240.257935] ? check_preemption_disabled+0x41/0x280 [ 3240.262959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3240.267708] ? trace_hardirqs_off_caller+0x55/0x210 [ 3240.272708] ? do_syscall_64+0x21/0x620 [ 3240.276671] do_syscall_64+0xf9/0x620 [ 3240.280454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.285620] RIP: 0033:0x416241 [ 3240.288848] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3240.307822] RSP: 002b:00007f8b1145fa60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3240.315516] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 0000000000416241 04:00:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000f000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3240.322774] RDX: 00007f8b1145fb0a RSI: 0000000000000002 RDI: 00007f8b1145fb00 [ 3240.330025] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3240.337405] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 3240.344674] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000008 04:00:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900002c030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3240.506823] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3240.564978] device bond1427 entered promiscuous mode 04:00:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000048030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3240.591960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pig=6084 comm=syz-executor.4 [ 3240.636882] bond1427: making interface bridge2555 the new active one [ 3240.656029] device bridge2555 entered promiscuous mode [ 3240.681656] bond1427: Enslaving bridge2555 as an active interface with an up link [ 3240.717656] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x29000000}) 04:00:55 executing program 1 (fault-call:6 fault-nth:9): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3240.775639] bond1427: Enslaving bridge2556 as an active interface with a down link 04:00:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900004c030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:00:56 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x1, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000140)=""/129) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r7 = socket(0x27, 0x3, 0x0) setsockopt$inet_int(r7, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local, r8}, 0xc) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_USE_IFADDR={0x5, 0x18, 0x1}]}}}]}, 0x3c}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f0000000200)={'veth1_to_batadv\x00', {0x2, 0x4e23, @remote}}) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="010200000000000a00001b00000008009a0002000000"], 0x1c}}, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r9, &(0x7f00000017c0), 0x1b4, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r9, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) epoll_create1(0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) sendfile(r1, r10, &(0x7f0000000280)=0x4ce, 0xffffffff) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:00:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19b7, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3240.921815] FAULT_INJECTION: forcing a failure. [ 3240.921815] name failslab, interval 1, probability 0, space 0, times 0 [ 3241.002875] CPU: 1 PID: 6216 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3241.010702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3241.020065] Call Trace: [ 3241.022671] dump_stack+0x188/0x20d [ 3241.026316] should_fail.cold+0xa/0x1b [ 3241.030217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3241.035335] __should_failslab+0x115/0x180 [ 3241.039578] should_failslab+0x5/0xf [ 3241.043293] kmem_cache_alloc+0x29f/0x710 [ 3241.047445] ? rcu_read_lock_sched_held+0x10a/0x130 [ 3241.052464] selinux_file_alloc_security+0xaf/0x190 [ 3241.057494] security_file_alloc+0x5c/0xa0 [ 3241.061740] __alloc_file+0xc9/0x330 [ 3241.065464] alloc_empty_file+0x6d/0x170 [ 3241.067252] device bond1428 entered promiscuous mode [ 3241.069547] path_openat+0xf2/0x4200 [ 3241.069569] ? __lock_acquire+0x6ee/0x49c0 [ 3241.069581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.069598] ? mark_held_locks+0xf0/0xf0 [ 3241.092028] ? __isolate_free_page+0x4c0/0x4c0 [ 3241.096641] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3241.101319] ? __lock_is_held+0xad/0x140 [ 3241.105387] do_filp_open+0x1a1/0x280 [ 3241.106917] bond1428: making interface bridge2557 the new active one [ 3241.109226] ? may_open_dev+0xf0/0xf0 [ 3241.109239] ? find_held_lock+0x2d/0x110 [ 3241.109250] ? __alloc_fd+0x43c/0x550 [ 3241.109267] ? lock_downgrade+0x740/0x740 [ 3241.115876] device bridge2557 entered promiscuous mode [ 3241.119529] ? __lock_is_held+0xad/0x140 [ 3241.119566] ? do_raw_spin_unlock+0x171/0x260 [ 3241.119580] ? _raw_spin_unlock+0x29/0x40 [ 3241.119595] ? __alloc_fd+0x43c/0x550 [ 3241.125191] bond1428: Enslaving bridge2557 as an active interface with an up link [ 3241.127428] do_sys_open+0x3c0/0x500 [ 3241.127443] ? filp_open+0x70/0x70 [ 3241.127455] ? check_preemption_disabled+0x41/0x280 [ 3241.127471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3241.178138] ? trace_hardirqs_off_caller+0x55/0x210 [ 3241.183167] ? do_syscall_64+0x21/0x620 [ 3241.187158] do_syscall_64+0xf9/0x620 [ 3241.190972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.196168] RIP: 0033:0x416241 [ 3241.199370] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3241.220364] RSP: 002b:00007f8b11480a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 3241.228080] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 0000000000416241 [ 3241.235459] RDX: 00007f8b11480b0a RSI: 0000000000000002 RDI: 00007f8b11480b00 [ 3241.242732] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3241.250054] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 3241.257315] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000009 04:00:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000004001000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:00:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000060030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3241.355572] audit: type=1800 audit(1583640056.470:881): pid=6212 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17960 res=0 04:00:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2a000000}) [ 3241.431848] validate_nla: 1 callbacks suppressed [ 3241.431855] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000068030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3241.512755] bond1428: Enslaving bridge2558 as an active interface with a down link 04:00:56 executing program 1 (fault-call:6 fault-nth:10): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:00:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19b8, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:00:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000003000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:00:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900006c030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3241.676269] audit: type=1800 audit(1583640056.790:882): pid=6250 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16657 res=0 [ 3241.683637] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3241.714726] FAULT_INJECTION: forcing a failure. [ 3241.714726] name failslab, interval 1, probability 0, space 0, times 0 [ 3241.736604] CPU: 0 PID: 6371 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3241.745377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3241.754837] Call Trace: [ 3241.757436] dump_stack+0x188/0x20d [ 3241.761082] should_fail.cold+0xa/0x1b [ 3241.764989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3241.770150] ? __lock_is_held+0xad/0x140 [ 3241.774262] ? loop_info64_to_compat+0x690/0x690 [ 3241.779021] ? loop_info64_to_compat+0x690/0x690 [ 3241.783789] __should_failslab+0x115/0x180 [ 3241.788034] should_failslab+0x5/0xf [ 3241.791757] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 3241.795093] device bond1429 entered promiscuous mode [ 3241.796431] ? __lockdep_init_map+0x100/0x5a0 [ 3241.796447] ? __lockdep_init_map+0x100/0x5a0 [ 3241.796465] ? loop_info64_to_compat+0x690/0x690 [ 3241.815266] __kthread_create_on_node+0xd2/0x410 [ 3241.820032] ? __kthread_parkme+0x1b0/0x1b0 [ 3241.824374] ? lo_ioctl+0x1bb/0x20e0 [ 3241.828106] ? lock_downgrade+0x740/0x740 [ 3241.832270] ? loop_info64_to_compat+0x690/0x690 [ 3241.837029] kthread_create_on_node+0xbb/0xf0 [ 3241.841623] ? __kthread_create_on_node+0x410/0x410 [ 3241.846651] ? iterate_fd+0x350/0x350 [ 3241.850635] ? __lockdep_init_map+0x100/0x5a0 [ 3241.855138] ? __lockdep_init_map+0x100/0x5a0 [ 3241.859648] lo_ioctl+0xae2/0x20e0 [ 3241.863200] ? lo_rw_aio+0x12f0/0x12f0 [ 3241.867102] blkdev_ioctl+0xbf7/0x1a1c [ 3241.871006] ? blkpg_ioctl+0x9e0/0x9e0 [ 3241.874360] bond1429: making interface bridge2559 the new active one [ 3241.874961] ? mark_held_locks+0xf0/0xf0 04:00:56 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0102080000000000000000000000000000000000000008a98bba86dba3f713507d75b449d8aae88dc9b0d1583f85d6656fa8427ac051d04df7a86fcde39739dae7ddca3bf1b205ae1aa50fee0ca4fe0f749ee0123c1b4ca3bd20fd4b00c6cd30be3b23d7792f491bd1bd636b21af564886ce67ee25867c0db19b8e74ee906918a3128c44c2edc23200"/152], 0x1c}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r5, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)=0x0) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r0, &(0x7f0000000280)={r2, r8, 0x8}) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3241.874981] ? find_held_lock+0x2d/0x110 [ 3241.875001] ? debug_check_no_obj_freed+0x20a/0x42e [ 3241.885669] device bridge2559 entered promiscuous mode [ 3241.889597] block_ioctl+0xe9/0x130 [ 3241.889612] ? blkdev_fallocate+0x3f0/0x3f0 [ 3241.889630] do_vfs_ioctl+0xcda/0x12e0 [ 3241.897480] bond1429: Enslaving bridge2559 as an active interface with an up link [ 3241.899905] ? selinux_file_ioctl+0x46c/0x5d0 [ 3241.899919] ? selinux_file_ioctl+0x125/0x5d0 [ 3241.899938] ? check_preemption_disabled+0x41/0x280 04:00:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19b9, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3241.913565] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3241.919364] ? ioctl_preallocate+0x200/0x200 [ 3241.919382] ? selinux_file_mprotect+0x600/0x600 [ 3241.919399] ? __fget+0x340/0x510 [ 3241.949687] bond1429: Enslaving bridge2560 as an active interface with a down link [ 3241.949959] ? iterate_fd+0x350/0x350 [ 3241.964883] ? putname+0xe1/0x120 [ 3241.968346] ? security_file_ioctl+0x6c/0xb0 [ 3241.972753] ksys_ioctl+0x9b/0xc0 [ 3241.976206] __x64_sys_ioctl+0x6f/0xb0 [ 3241.980076] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3241.984642] do_syscall_64+0xf9/0x620 [ 3241.988426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.993595] RIP: 0033:0x45c317 [ 3241.996787] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3242.015673] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3242.023375] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045c317 [ 3242.030646] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 04:00:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2b000000}) [ 3242.037905] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3242.045155] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3242.052402] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000a 04:00:57 executing program 1 (fault-call:6 fault-nth:11): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3242.163462] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000074030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3242.266506] device bond1430 entered promiscuous mode [ 3242.275800] audit: type=1800 audit(1583640057.390:883): pid=6392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16978 res=0 04:00:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2c000000}) [ 3242.361683] audit: type=1800 audit(1583640057.420:884): pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16978 res=0 [ 3242.395906] bond1430: making interface bridge2561 the new active one [ 3242.406757] device bridge2561 entered promiscuous mode 04:00:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000a000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3242.406813] FAULT_INJECTION: forcing a failure. [ 3242.406813] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.421288] bond1430: Enslaving bridge2561 as an active interface with an up link [ 3242.446281] CPU: 1 PID: 6501 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3242.454092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3242.463449] Call Trace: [ 3242.466059] dump_stack+0x188/0x20d [ 3242.469697] should_fail.cold+0xa/0x1b [ 3242.473598] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3242.478710] ? __lock_is_held+0xad/0x140 [ 3242.482788] __should_failslab+0x115/0x180 [ 3242.487030] should_failslab+0x5/0xf [ 3242.490747] kmem_cache_alloc+0x29f/0x710 [ 3242.494913] __kernfs_new_node+0xd2/0x680 [ 3242.499088] ? kernfs_add_one+0x377/0x4d0 [ 3242.503237] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3242.507979] ? mutex_trylock+0x1a0/0x1a0 [ 3242.512095] ? lock_downgrade+0x740/0x740 [ 3242.516248] ? mutex_trylock+0x1a0/0x1a0 [ 3242.520310] ? __mutex_unlock_slowpath+0xea/0x670 [ 3242.525157] kernfs_new_node+0x92/0x120 [ 3242.529134] __kernfs_create_file+0x51/0x33f [ 3242.533588] sysfs_add_file_mode_ns+0x224/0x520 [ 3242.538249] internal_create_group+0x359/0xb90 [ 3242.542827] ? lock_acquire+0x170/0x400 [ 3242.546978] ? remove_files.isra.0+0x190/0x190 [ 3242.551547] ? lock_downgrade+0x740/0x740 [ 3242.555688] lo_ioctl+0xf89/0x20e0 [ 3242.559219] ? lo_rw_aio+0x12f0/0x12f0 [ 3242.563096] blkdev_ioctl+0xbf7/0x1a1c [ 3242.566970] ? blkpg_ioctl+0x9e0/0x9e0 [ 3242.570843] ? mark_held_locks+0xf0/0xf0 [ 3242.574892] ? find_held_lock+0x2d/0x110 [ 3242.578947] ? debug_check_no_obj_freed+0x20a/0x42e [ 3242.584003] block_ioctl+0xe9/0x130 [ 3242.587618] ? blkdev_fallocate+0x3f0/0x3f0 [ 3242.591925] do_vfs_ioctl+0xcda/0x12e0 [ 3242.595804] ? selinux_file_ioctl+0x46c/0x5d0 [ 3242.600328] ? selinux_file_ioctl+0x125/0x5d0 [ 3242.604809] ? check_preemption_disabled+0x41/0x280 [ 3242.609810] ? ioctl_preallocate+0x200/0x200 [ 3242.614206] ? selinux_file_mprotect+0x600/0x600 [ 3242.618952] ? __fget+0x340/0x510 [ 3242.622408] ? iterate_fd+0x350/0x350 [ 3242.626209] ? putname+0xe1/0x120 [ 3242.629688] ? security_file_ioctl+0x6c/0xb0 [ 3242.634083] ksys_ioctl+0x9b/0xc0 [ 3242.637523] __x64_sys_ioctl+0x6f/0xb0 [ 3242.641394] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3242.645959] do_syscall_64+0xf9/0x620 [ 3242.649756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3242.654964] RIP: 0033:0x45c317 [ 3242.658139] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3242.677030] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3242.684736] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3242.692003] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3242.699255] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3242.706510] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3242.713900] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000b 04:00:58 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900007a030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3242.931839] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3242.957498] EXT4-fs (sda1): Remounting filesystem read-only 04:00:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2d000000}) 04:00:58 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000082030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3243.017315] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000e000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3243.119726] bond1430: Enslaving bridge2562 as an active interface with a down link 04:00:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19ba, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:00:58 executing program 1 (fault-call:6 fault-nth:12): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3243.202753] f2fs_msg: 102 callbacks suppressed [ 3243.202764] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:00:58 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x1, 0x91) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010200800000000000001b00000008009a0002000000abe103cdce04f12000a2cbea1aaed976fe2878e9347697f78d2a866086aed2d9a034b852b42ebb3bbdbbf24dfcc5bdf6857de23088ba1d3bc6a531a40383142c369abb1cbf19e0980cc0dfb7a7f3c19863090c9211c43f3dcceba8c6bf91de2aa3d71a73976f1642148bcd5be6fd962020e5656258fef9a1802c1834aceb8f25c8ce54"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000280)=0x800, 0x4) socket$inet(0xa, 0x0, 0x84) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = semget(0x0, 0x2, 0x308) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4800, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f00000005c0)={@mcast2, 0x0}, &(0x7f0000000600)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newchain={0x4c, 0x64, 0x1920b20da956136e, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, r11, {0x9, 0x8}, {0xfff3, 0x8}, {0x9, 0xe}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_KEY_CVLAN_ETH_TYPE={0x6, 0x4f, 0x88a8}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0xb219}]}, 0x4c}}, 0x8000) r12 = dup3(r9, r10, 0x0) sendmsg$IPSET_CMD_DESTROY(r12, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x3, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004009}, 0x20000010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = fcntl$dupfd(r14, 0x0, r12) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="001b000000000000000000", @ANYRES64=r8], 0x2}}, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000004c0)={{0x0, r5, r8, r16, 0xee01, 0x101, 0x8}, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0xaa}) r17 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000080)={r17}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3243.285916] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3243.317996] F2FS-fs (loop2): Invalid log sectorsize (2181038089) [ 3243.327966] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3243.338428] audit: type=1800 audit(1583640058.460:885): pid=6652 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16802 res=0 [ 3243.343137] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3243.379414] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3243.396881] FAULT_INJECTION: forcing a failure. [ 3243.396881] name failslab, interval 1, probability 0, space 0, times 0 [ 3243.402202] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3243.422658] audit: type=1800 audit(1583640058.480:886): pid=6698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16802 res=0 04:00:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2e000000}) [ 3243.436525] F2FS-fs (loop2): Invalid log sectorsize (2181038089) [ 3243.450473] CPU: 0 PID: 6777 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3243.459530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3243.462910] device bond1431 entered promiscuous mode [ 3243.468877] Call Trace: [ 3243.468897] dump_stack+0x188/0x20d [ 3243.468917] should_fail.cold+0xa/0x1b [ 3243.484122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3243.485817] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3243.489236] ? __lock_is_held+0xad/0x140 [ 3243.489262] __should_failslab+0x115/0x180 [ 3243.489278] should_failslab+0x5/0xf [ 3243.489294] kmem_cache_alloc+0x29f/0x710 [ 3243.512815] ? find_held_lock+0x2d/0x110 [ 3243.516874] ? __schedule+0x1477/0x1d80 [ 3243.520841] __kernfs_new_node+0xd2/0x680 [ 3243.524989] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3243.529728] ? _raw_spin_unlock_irq+0x24/0x80 [ 3243.534228] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3243.538802] ? mark_held_locks+0xf0/0xf0 [ 3243.542849] kernfs_new_node+0x92/0x120 [ 3243.546812] kernfs_create_dir_ns+0x48/0x150 [ 3243.551207] internal_create_group+0x1bf/0xb90 [ 3243.555773] ? find_held_lock+0x2d/0x110 [ 3243.559821] ? lo_ioctl+0xf54/0x20e0 [ 3243.563527] ? lock_acquire+0x170/0x400 [ 3243.567488] ? remove_files.isra.0+0x190/0x190 [ 3243.572055] ? lock_downgrade+0x740/0x740 [ 3243.576209] lo_ioctl+0xf89/0x20e0 [ 3243.579753] ? lo_rw_aio+0x12f0/0x12f0 [ 3243.583641] blkdev_ioctl+0xbf7/0x1a1c [ 3243.587520] ? blkpg_ioctl+0x9e0/0x9e0 [ 3243.591401] ? mark_held_locks+0xf0/0xf0 [ 3243.595457] ? find_held_lock+0x2d/0x110 [ 3243.599514] ? debug_check_no_obj_freed+0x20a/0x42e [ 3243.604635] block_ioctl+0xe9/0x130 [ 3243.608253] ? blkdev_fallocate+0x3f0/0x3f0 [ 3243.612566] do_vfs_ioctl+0xcda/0x12e0 [ 3243.616445] ? selinux_file_ioctl+0x46c/0x5d0 [ 3243.620931] ? selinux_file_ioctl+0x125/0x5d0 [ 3243.625418] ? check_preemption_disabled+0x41/0x280 [ 3243.630427] ? ioctl_preallocate+0x200/0x200 [ 3243.634827] ? selinux_file_mprotect+0x600/0x600 [ 3243.639587] ? __fget+0x340/0x510 [ 3243.643034] ? iterate_fd+0x350/0x350 [ 3243.646823] ? putname+0xe1/0x120 [ 3243.650273] ? security_file_ioctl+0x6c/0xb0 [ 3243.654671] ksys_ioctl+0x9b/0xc0 [ 3243.658117] __x64_sys_ioctl+0x6f/0xb0 [ 3243.661997] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3243.666580] do_syscall_64+0xf9/0x620 [ 3243.670379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3243.675566] RIP: 0033:0x45c317 [ 3243.678753] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:00:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000c00e000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3243.697644] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3243.705342] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3243.712614] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3243.719865] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3243.727120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3243.734371] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000c [ 3243.789615] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3243.797861] bond1431: making interface bridge2563 the new active one [ 3243.806214] device bridge2563 entered promiscuous mode [ 3243.814694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pig=6780 comm=syz-executor.4 [ 3243.827201] EXT4-fs (sda1): Remounting filesystem read-only 04:00:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900008a030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3243.843239] bond1431: Enslaving bridge2563 as an active interface with an up link [ 3243.895067] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2f000000}) [ 3244.025908] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3244.065735] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:00:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000070000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:00:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000001f000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:00:59 executing program 1 (fault-call:6 fault-nth:13): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3244.187811] bond1431: Enslaving bridge2564 as an active interface with a down link [ 3244.222925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pig=6780 comm=syz-executor.4 04:00:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19bb, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:00:59 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xa4) write$FUSE_DIRENT(r0, &(0x7f0000000140)={0xb0, 0xfffffffffffffff5, 0x7, [{0x0, 0x101, 0x6, 0x1, 'cpuset'}, {0x3, 0x0, 0x13, 0x8, '!)vboxnet0*\\#&loem1'}, {0x2, 0x5, 0x9, 0xf0f9, 'selinux\xbf*'}, {0x4, 0x8, 0x9, 0x4, '(GPLwlan0'}]}, 0xb0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3244.377007] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:00:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x30000000}) 04:00:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000090000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3244.463899] FAULT_INJECTION: forcing a failure. [ 3244.463899] name failslab, interval 1, probability 0, space 0, times 0 [ 3244.483124] CPU: 0 PID: 6943 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3244.490941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3244.500318] Call Trace: [ 3244.502917] dump_stack+0x188/0x20d [ 3244.506573] should_fail.cold+0xa/0x1b [ 3244.510564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3244.515686] ? __lock_is_held+0xad/0x140 [ 3244.519770] __should_failslab+0x115/0x180 [ 3244.523966] device bond1432 entered promiscuous mode [ 3244.524009] should_failslab+0x5/0xf [ 3244.532794] kmem_cache_alloc+0x29f/0x710 [ 3244.536958] ? kernfs_add_one+0x377/0x4d0 [ 3244.541104] __kernfs_new_node+0xd2/0x680 [ 3244.545271] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3244.550031] ? __mutex_unlock_slowpath+0xea/0x670 [ 3244.554870] ? wait_for_completion+0x3c0/0x3c0 [ 3244.559444] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 3244.564717] kernfs_new_node+0x92/0x120 [ 3244.568789] __kernfs_create_file+0x51/0x33f [ 3244.573189] sysfs_add_file_mode_ns+0x224/0x520 [ 3244.577857] internal_create_group+0x359/0xb90 [ 3244.582431] ? lock_acquire+0x170/0x400 [ 3244.586482] ? remove_files.isra.0+0x190/0x190 [ 3244.591050] ? lock_downgrade+0x740/0x740 [ 3244.595192] lo_ioctl+0xf89/0x20e0 [ 3244.598720] ? lo_rw_aio+0x12f0/0x12f0 [ 3244.602611] blkdev_ioctl+0xbf7/0x1a1c [ 3244.606501] ? blkpg_ioctl+0x9e0/0x9e0 [ 3244.610383] ? mark_held_locks+0xf0/0xf0 [ 3244.614435] ? find_held_lock+0x2d/0x110 [ 3244.618490] ? debug_check_no_obj_freed+0x20a/0x42e [ 3244.623501] block_ioctl+0xe9/0x130 [ 3244.627115] ? blkdev_fallocate+0x3f0/0x3f0 [ 3244.631447] do_vfs_ioctl+0xcda/0x12e0 [ 3244.635326] ? selinux_file_ioctl+0x46c/0x5d0 [ 3244.639822] ? selinux_file_ioctl+0x125/0x5d0 [ 3244.644320] ? check_preemption_disabled+0x41/0x280 [ 3244.649334] ? ioctl_preallocate+0x200/0x200 [ 3244.653739] ? selinux_file_mprotect+0x600/0x600 [ 3244.658486] ? __fget+0x340/0x510 [ 3244.661935] ? iterate_fd+0x350/0x350 [ 3244.665731] ? putname+0xe1/0x120 [ 3244.669179] ? security_file_ioctl+0x6c/0xb0 [ 3244.673580] ksys_ioctl+0x9b/0xc0 [ 3244.677074] __x64_sys_ioctl+0x6f/0xb0 [ 3244.680954] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3244.685546] do_syscall_64+0xf9/0x620 [ 3244.689343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3244.694521] RIP: 0033:0x45c317 04:00:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000ee3d000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3244.697707] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3244.716614] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3244.724329] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3244.731586] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3244.738841] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3244.746107] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3244.753376] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000d [ 3244.786332] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3244.817167] EXT4-fs (sda1): Remounting filesystem read-only [ 3244.827382] bond1432: making interface bridge2565 the new active one [ 3244.841103] device bridge2565 entered promiscuous mode 04:01:00 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000000a0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3244.862457] bond1432: Enslaving bridge2565 as an active interface with an up link [ 3244.929563] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:00 executing program 1 (fault-call:6 fault-nth:14): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19bc, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:00 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000000f0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:00 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = msgget(0x1, 0x2) r3 = getuid() r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4800, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f00000005c0)={@mcast2, 0x0}, &(0x7f0000000600)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newchain={0x4c, 0x64, 0x1920b20da956136e, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0x9, 0x8}, {0xfff3, 0x8}, {0x9, 0xe}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_KEY_CVLAN_ETH_TYPE={0x6, 0x4f, 0x88a8}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0xb219}]}, 0x4c}}, 0x8000) r10 = dup3(r7, r8, 0x0) sendmsg$IPSET_CMD_DESTROY(r10, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x3, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004009}, 0x20000010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = fcntl$dupfd(r12, 0x0, r10) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="001b000000000000000000", @ANYRES64=r6], 0x2}}, 0x0) r14 = getegid() r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f0000000380)) r16 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r16, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$TIOCGPGRP(r16, 0x540f, &(0x7f0000000180)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000001c0)={{0x0, r3, 0xffffffffffffffff, 0x0, r14, 0xc5}, 0x0, 0x0, 0x1fffc0, 0x1, 0x4, 0x1c0000000, 0x401, 0x0, 0xffff, 0xfff, r15, r17}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) r18 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r18, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r19 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r19, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @broadcast}}, 0x24) sendmmsg(r19, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(r19, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r19, 0x119, 0x1, &(0x7f0000000080), 0x4) [ 3245.142397] audit: type=1800 audit(1583640060.260:887): pid=7062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17057 res=0 [ 3245.172466] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3245.182744] FAULT_INJECTION: forcing a failure. 04:01:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000003f000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3245.182744] name failslab, interval 1, probability 0, space 0, times 0 [ 3245.195481] CPU: 0 PID: 7193 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3245.203299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3245.212656] Call Trace: [ 3245.215259] dump_stack+0x188/0x20d [ 3245.218940] should_fail.cold+0xa/0x1b [ 3245.222826] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3245.227929] ? __lock_is_held+0xad/0x140 [ 3245.232010] __should_failslab+0x115/0x180 [ 3245.236249] should_failslab+0x5/0xf [ 3245.239972] kmem_cache_alloc+0x29f/0x710 [ 3245.244125] ? kernfs_add_one+0x377/0x4d0 [ 3245.248284] __kernfs_new_node+0xd2/0x680 [ 3245.252437] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3245.252802] device bond1433 entered promiscuous mode [ 3245.257202] ? __mutex_unlock_slowpath+0xea/0x670 [ 3245.257221] ? wait_for_completion+0x3c0/0x3c0 [ 3245.257241] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 3245.277001] kernfs_new_node+0x92/0x120 [ 3245.280985] __kernfs_create_file+0x51/0x33f [ 3245.285407] sysfs_add_file_mode_ns+0x224/0x520 [ 3245.290087] internal_create_group+0x359/0xb90 [ 3245.293136] bond1433: making interface bridge2566 the new active one [ 3245.294682] ? lock_acquire+0x170/0x400 [ 3245.294702] ? remove_files.isra.0+0x190/0x190 [ 3245.305872] device bridge2566 entered promiscuous mode [ 3245.309831] ? lock_downgrade+0x740/0x740 [ 3245.309869] lo_ioctl+0xf89/0x20e0 [ 3245.316892] bond1433: Enslaving bridge2566 as an active interface with an up link [ 3245.319268] ? lo_rw_aio+0x12f0/0x12f0 [ 3245.319288] blkdev_ioctl+0xbf7/0x1a1c [ 3245.319307] ? blkpg_ioctl+0x9e0/0x9e0 [ 3245.342072] ? mark_held_locks+0xf0/0xf0 [ 3245.346149] ? __schedule+0x86e/0x1d80 [ 3245.350057] ? firmware_map_remove+0x19a/0x19a [ 3245.354654] block_ioctl+0xe9/0x130 [ 3245.358383] ? blkdev_fallocate+0x3f0/0x3f0 [ 3245.358884] bond1433: Enslaving bridge2567 as an active interface with a down link [ 3245.362712] do_vfs_ioctl+0xcda/0x12e0 [ 3245.362732] ? selinux_file_ioctl+0x46c/0x5d0 [ 3245.362747] ? selinux_file_ioctl+0x125/0x5d0 [ 3245.362763] ? check_preemption_disabled+0x41/0x280 [ 3245.362780] ? ioctl_preallocate+0x200/0x200 04:01:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19bd, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3245.362797] ? selinux_file_mprotect+0x600/0x600 [ 3245.362813] ? __fget+0x340/0x510 [ 3245.362832] ? iterate_fd+0x350/0x350 [ 3245.362845] ? putname+0xe1/0x120 [ 3245.362864] ? security_file_ioctl+0x6c/0xb0 [ 3245.362880] ksys_ioctl+0x9b/0xc0 [ 3245.416091] __x64_sys_ioctl+0x6f/0xb0 [ 3245.420004] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3245.424609] do_syscall_64+0xf9/0x620 [ 3245.425482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pig=7185 comm=syz-executor.4 [ 3245.428416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3245.428425] RIP: 0033:0x45c317 [ 3245.428440] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3245.467981] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3245.475698] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045c317 [ 3245.482973] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 04:01:00 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000a1", @ANYRES16=r2, @ANYBLOB="010200000000000000001b00000008009a0002000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x31000000}) [ 3245.490242] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3245.497506] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3245.504766] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000e [ 3245.535021] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3245.569520] EXT4-fs (sda1): Remounting filesystem read-only 04:01:00 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000140000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3245.770088] device bond1434 entered promiscuous mode 04:01:00 executing program 1 (fault-call:6 fault-nth:15): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:00 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x3, 0x2, 0x2, 0x7, 0x8, 0x94}, 0x20) epoll_create1(0x0) epoll_create1(0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3245.819175] bond1434: making interface bridge2568 the new active one [ 3245.838070] audit: type=1800 audit(1583640060.950:888): pid=7220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17041 res=0 [ 3245.876931] device bridge2568 entered promiscuous mode 04:01:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x32000000}) [ 3245.903549] bond1434: Enslaving bridge2568 as an active interface with an up link 04:01:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000140000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:01 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000001f0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3246.027032] FAULT_INJECTION: forcing a failure. [ 3246.027032] name failslab, interval 1, probability 0, space 0, times 0 [ 3246.035552] bond1434: Enslaving bridge2569 as an active interface with a down link [ 3246.060432] CPU: 1 PID: 7359 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3246.068251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3246.077615] Call Trace: [ 3246.080203] dump_stack+0x188/0x20d [ 3246.083860] should_fail.cold+0xa/0x1b [ 3246.087746] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3246.092838] ? __lock_is_held+0xad/0x140 [ 3246.096896] __should_failslab+0x115/0x180 [ 3246.101118] should_failslab+0x5/0xf [ 3246.104816] kmem_cache_alloc+0x29f/0x710 [ 3246.108960] ? kernfs_add_one+0x377/0x4d0 [ 3246.113103] __kernfs_new_node+0xd2/0x680 [ 3246.117237] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3246.121982] ? __mutex_unlock_slowpath+0xea/0x670 [ 3246.126808] ? wait_for_completion+0x3c0/0x3c0 [ 3246.131376] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 3246.136640] kernfs_new_node+0x92/0x120 [ 3246.140609] __kernfs_create_file+0x51/0x33f [ 3246.145005] sysfs_add_file_mode_ns+0x224/0x520 [ 3246.149694] internal_create_group+0x359/0xb90 [ 3246.154269] ? lock_acquire+0x170/0x400 [ 3246.158228] ? remove_files.isra.0+0x190/0x190 [ 3246.162792] ? lock_downgrade+0x740/0x740 [ 3246.166932] lo_ioctl+0xf89/0x20e0 [ 3246.170460] ? lo_rw_aio+0x12f0/0x12f0 [ 3246.174337] blkdev_ioctl+0xbf7/0x1a1c [ 3246.178216] ? blkpg_ioctl+0x9e0/0x9e0 [ 3246.182093] ? mark_held_locks+0xf0/0xf0 [ 3246.186143] ? find_held_lock+0x2d/0x110 [ 3246.190206] ? debug_check_no_obj_freed+0x20a/0x42e [ 3246.195236] block_ioctl+0xe9/0x130 [ 3246.198848] ? blkdev_fallocate+0x3f0/0x3f0 [ 3246.203169] do_vfs_ioctl+0xcda/0x12e0 [ 3246.207046] ? selinux_file_ioctl+0x46c/0x5d0 [ 3246.211531] ? selinux_file_ioctl+0x125/0x5d0 [ 3246.216039] ? check_preemption_disabled+0x41/0x280 [ 3246.221041] ? ioctl_preallocate+0x200/0x200 [ 3246.225436] ? selinux_file_mprotect+0x600/0x600 [ 3246.230180] ? __fget+0x340/0x510 [ 3246.233625] ? iterate_fd+0x350/0x350 [ 3246.237415] ? putname+0xe1/0x120 [ 3246.240861] ? security_file_ioctl+0x6c/0xb0 [ 3246.245256] ksys_ioctl+0x9b/0xc0 [ 3246.248700] __x64_sys_ioctl+0x6f/0xb0 [ 3246.252587] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3246.257194] do_syscall_64+0xf9/0x620 [ 3246.260997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3246.266176] RIP: 0033:0x45c317 [ 3246.269359] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3246.288248] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3246.295951] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3246.303207] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3246.310458] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3246.317720] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 04:01:01 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01020000000000000002000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES64], 0x8) 04:01:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19be, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3246.324979] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000000f 04:01:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000c45d000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3246.408621] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3246.464475] EXT4-fs (sda1): Remounting filesystem read-only [ 3246.486906] validate_nla: 3 callbacks suppressed [ 3246.486913] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:01 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000200000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x33000000}) [ 3246.569485] audit: type=1800 audit(1583640061.680:889): pid=7365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16929 res=0 [ 3246.629963] device bond1435 entered promiscuous mode 04:01:01 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x1c180) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3246.679025] audit: type=1800 audit(1583640061.680:890): pid=7474 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16929 res=0 04:01:01 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000002230000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3246.792978] bond1435: making interface bridge2570 the new active one [ 3246.822963] device bridge2570 entered promiscuous mode [ 3246.852193] bond1435: Enslaving bridge2570 as an active interface with an up link [ 3246.896873] audit: type=1800 audit(1583640062.010:891): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16625 res=0 [ 3246.927405] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3246.950643] audit: type=1800 audit(1583640062.010:892): pid=7612 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16625 res=0 04:01:02 executing program 1 (fault-call:6 fault-nth:16): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:02 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000003f0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x34000000}) 04:01:02 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000060000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:02 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x881409, &(0x7f0000000140)=ANY=[@ANYBLOB="6d6f303f0300303030303030093030352c6f626a5f747927a4478e65046f294eff109a55c5a070653d2cff7f61be9d9b79425d6a62643573756d2e2e2e6d6b74c3c2a9cb681b482a6435d6bbe514eecfaee80aed381429e9f563facd3c32adf0aa549a9b6908ff0c3896a164364a0f0ef8f8c7393ca6bdc0b3ce02c7d4093d6871fe6b026a3ab3bad8970c7569f6e188f2174f6e0af94df1eda7f434e6dfa5f250e927fb3d7cc7725333b7a43fa7638e201017d5eafd5a5734a12a1deced3df8149b3ed4117d92a067ec012c84e33b65720d96"]) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) dup(r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19bf, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3247.014963] bond1435: Enslaving bridge2571 as an active interface with a down link 04:01:02 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000004e0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3247.175198] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:02 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xc0d, 0x10800) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000200)=0x62, 0x1) r3 = dup(r1) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000b672776fe704f2dbf9e09a4da661663cf82ff94660ebef5a06634f499dabc8c5948cbd57eaf59663c3d13678767a9b13f56f7df21f122cd41859a819fa10bb2a2adb1166d1427b752bdf734efde6cae6684ab3167f1a137180517f3c78d1595023a40211dd9710a4d8a996c7e3f1a4f72592fb38896d84011ecb52294dc2665d398183265a7f755fa0076f", @ANYRES16=r4, @ANYBLOB="010200000000000000001b00000008009a0002000000"], 0x1c}}, 0x0) r5 = shmget(0x1, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r5, 0xc) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:02 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000ec0000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3247.298243] FAULT_INJECTION: forcing a failure. [ 3247.298243] name failslab, interval 1, probability 0, space 0, times 0 [ 3247.314916] device bond1436 entered promiscuous mode [ 3247.325365] CPU: 1 PID: 7668 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3247.333180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3247.342535] Call Trace: [ 3247.345130] dump_stack+0x188/0x20d [ 3247.348757] should_fail.cold+0xa/0x1b [ 3247.352641] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3247.357731] ? __lock_is_held+0xad/0x140 [ 3247.361784] __should_failslab+0x115/0x180 [ 3247.366017] should_failslab+0x5/0xf [ 3247.369721] kmem_cache_alloc+0x29f/0x710 [ 3247.373869] ? kernfs_add_one+0x377/0x4d0 [ 3247.378021] __kernfs_new_node+0xd2/0x680 [ 3247.382165] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3247.386907] ? __mutex_unlock_slowpath+0xea/0x670 [ 3247.391734] ? wait_for_completion+0x3c0/0x3c0 [ 3247.396304] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 3247.401569] kernfs_new_node+0x92/0x120 [ 3247.405530] __kernfs_create_file+0x51/0x33f [ 3247.409921] sysfs_add_file_mode_ns+0x224/0x520 [ 3247.414582] internal_create_group+0x359/0xb90 [ 3247.419166] ? lock_acquire+0x170/0x400 [ 3247.423129] ? remove_files.isra.0+0x190/0x190 [ 3247.427694] ? lock_downgrade+0x740/0x740 [ 3247.431834] lo_ioctl+0xf89/0x20e0 [ 3247.435363] ? lo_rw_aio+0x12f0/0x12f0 [ 3247.439238] blkdev_ioctl+0xbf7/0x1a1c [ 3247.443112] ? blkpg_ioctl+0x9e0/0x9e0 [ 3247.446984] ? mark_held_locks+0xf0/0xf0 [ 3247.451033] ? find_held_lock+0x2d/0x110 [ 3247.455079] ? debug_check_no_obj_freed+0x20a/0x42e [ 3247.460086] block_ioctl+0xe9/0x130 [ 3247.463698] ? blkdev_fallocate+0x3f0/0x3f0 [ 3247.468025] do_vfs_ioctl+0xcda/0x12e0 [ 3247.471903] ? selinux_file_ioctl+0x46c/0x5d0 [ 3247.476384] ? selinux_file_ioctl+0x125/0x5d0 [ 3247.480868] ? check_preemption_disabled+0x41/0x280 [ 3247.485873] ? ioctl_preallocate+0x200/0x200 [ 3247.490279] ? selinux_file_mprotect+0x600/0x600 [ 3247.495031] ? __fget+0x340/0x510 [ 3247.498478] ? iterate_fd+0x350/0x350 [ 3247.502267] ? putname+0xe1/0x120 [ 3247.505715] ? security_file_ioctl+0x6c/0xb0 [ 3247.510113] ksys_ioctl+0x9b/0xc0 [ 3247.513571] __x64_sys_ioctl+0x6f/0xb0 [ 3247.517468] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3247.522082] do_syscall_64+0xf9/0x620 [ 3247.525880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3247.531058] RIP: 0033:0x45c317 04:01:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x35000000}) [ 3247.534240] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3247.553130] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3247.560825] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3247.568078] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3247.575335] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3247.582611] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3247.589866] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000010 [ 3247.687341] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:02 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000530000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3247.741404] bond1436: making interface bridge2572 the new active one [ 3247.779426] EXT4-fs (sda1): Remounting filesystem read-only [ 3247.801950] device bridge2572 entered promiscuous mode 04:01:02 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x80000000) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r4, &(0x7f00000017c0), 0x1b4, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000000)={0x2, 0x1}, 0x2) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3247.823610] bond1436: Enslaving bridge2572 as an active interface with an up link [ 3247.868397] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3247.891019] audit: type=1800 audit(1583640063.010:893): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16737 res=0 [ 3247.932573] bond1436: Enslaving bridge2573 as an active interface with a down link 04:01:03 executing program 1 (fault-call:6 fault-nth:17): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:03 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000005dc4000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x36000000}) 04:01:03 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000003d00000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3248.237435] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3248.294284] f2fs_msg: 94 callbacks suppressed [ 3248.294297] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:01:03 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000e0000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3248.374681] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3248.390524] FAULT_INJECTION: forcing a failure. [ 3248.390524] name failslab, interval 1, probability 0, space 0, times 0 [ 3248.396239] device bond1437 entered promiscuous mode [ 3248.418736] F2FS-fs (loop2): Invalid log sectorsize (50331657) [ 3248.429723] CPU: 0 PID: 8049 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3248.437540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.442269] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3248.446896] Call Trace: [ 3248.446918] dump_stack+0x188/0x20d [ 3248.446938] should_fail.cold+0xa/0x1b [ 3248.464472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3248.469581] ? __lock_is_held+0xad/0x140 [ 3248.473662] __should_failslab+0x115/0x180 [ 3248.475709] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3248.477904] should_failslab+0x5/0xf [ 3248.477919] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 3248.477987] ? dev_uevent_filter+0xd0/0xd0 [ 3248.478006] kobject_uevent_env+0x225/0x1160 [ 3248.496212] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3248.497614] lo_ioctl+0x1006/0x20e0 [ 3248.497634] ? lo_rw_aio+0x12f0/0x12f0 [ 3248.497653] blkdev_ioctl+0xbf7/0x1a1c [ 3248.502489] F2FS-fs (loop2): Invalid log sectorsize (50331657) 04:01:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x37000000}) [ 3248.509532] ? blkpg_ioctl+0x9e0/0x9e0 [ 3248.509550] ? mark_held_locks+0xf0/0xf0 [ 3248.509569] ? find_held_lock+0x2d/0x110 [ 3248.509589] ? debug_check_no_obj_freed+0x20a/0x42e [ 3248.518267] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3248.520956] block_ioctl+0xe9/0x130 [ 3248.520970] ? blkdev_fallocate+0x3f0/0x3f0 [ 3248.520985] do_vfs_ioctl+0xcda/0x12e0 [ 3248.521001] ? selinux_file_ioctl+0x46c/0x5d0 [ 3248.521014] ? selinux_file_ioctl+0x125/0x5d0 [ 3248.521032] ? check_preemption_disabled+0x41/0x280 [ 3248.577182] ? ioctl_preallocate+0x200/0x200 [ 3248.581606] ? selinux_file_mprotect+0x600/0x600 [ 3248.586372] ? __fget+0x340/0x510 [ 3248.589832] ? iterate_fd+0x350/0x350 [ 3248.593636] ? putname+0xe1/0x120 [ 3248.597107] ? security_file_ioctl+0x6c/0xb0 [ 3248.601645] ksys_ioctl+0x9b/0xc0 [ 3248.605105] __x64_sys_ioctl+0x6f/0xb0 [ 3248.608999] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3248.613593] do_syscall_64+0xf9/0x620 [ 3248.617406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.622594] RIP: 0033:0x45c317 [ 3248.625787] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3248.644683] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3248.652394] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3248.659664] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3248.666966] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3248.674245] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3248.681521] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000011 [ 3248.715993] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:03 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900007fff0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3248.804763] EXT4-fs (sda1): Remounting filesystem read-only 04:01:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x38000000}) [ 3248.953067] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3248.982213] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:01:04 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000003dee000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:04 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000000008000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3249.265986] audit: type=1800 audit(1583640064.380:894): pid=8203 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 [ 3249.651481] bond1437: making interface bridge2574 the new active one [ 3249.658025] device bridge2574 entered promiscuous mode [ 3249.665441] bond1437: Enslaving bridge2574 as an active interface with an up link [ 3249.674247] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3249.731270] bond1437: Enslaving bridge2575 as an active interface with a down link [ 3251.118864] IPVS: ftp: loaded support on port[0] = 21 [ 3251.132371] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3251.139237] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3251.148443] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3251.155463] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3251.165136] device bridge_slave_1 left promiscuous mode [ 3251.170695] bridge0: port 2(bridge_slave_1) entered disabled state [ 3251.221340] device bridge_slave_0 left promiscuous mode [ 3251.226834] bridge0: port 1(bridge_slave_0) entered disabled state [ 3251.289217] device veth1_macvtap left promiscuous mode [ 3251.294634] device veth0_macvtap left promiscuous mode [ 3251.299941] device veth1_vlan left promiscuous mode [ 3251.305071] device veth0_vlan left promiscuous mode [ 3255.843913] device hsr_slave_1 left promiscuous mode [ 3255.884416] device hsr_slave_0 left promiscuous mode [ 3255.941200] team0 (unregistering): Port device team_slave_1 removed [ 3255.952043] team0 (unregistering): Port device team_slave_0 removed [ 3255.961954] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3255.997090] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3256.066645] bond0 (unregistering): Released all slaves [ 3256.180525] chnl_net:caif_netlink_parms(): no params data found [ 3256.240312] bridge0: port 1(bridge_slave_0) entered blocking state [ 3256.246748] bridge0: port 1(bridge_slave_0) entered disabled state [ 3256.254759] device bridge_slave_0 entered promiscuous mode [ 3256.262537] bridge0: port 2(bridge_slave_1) entered blocking state [ 3256.268977] bridge0: port 2(bridge_slave_1) entered disabled state [ 3256.277628] device bridge_slave_1 entered promiscuous mode [ 3256.302371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3256.313423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3256.335454] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3256.343943] team0: Port device team_slave_0 added [ 3256.350646] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3256.358866] team0: Port device team_slave_1 added [ 3256.432561] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3256.439153] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3256.466262] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3256.479509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3256.486196] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3256.511716] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3256.523966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3256.533380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3256.604201] device hsr_slave_0 entered promiscuous mode [ 3256.650920] device hsr_slave_1 entered promiscuous mode [ 3256.691619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3256.699461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3256.858066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3256.864496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3256.871195] bridge0: port 1(bridge_slave_0) entered blocking state [ 3256.877556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3256.960059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3256.976572] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3256.996295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3257.008520] bridge0: port 1(bridge_slave_0) entered disabled state [ 3257.028210] bridge0: port 2(bridge_slave_1) entered disabled state [ 3257.049320] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3257.058533] 8021q: adding VLAN 0 to HW filter on device team0 [ 3257.084122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3257.097691] bridge0: port 1(bridge_slave_0) entered blocking state [ 3257.104121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3257.119577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3257.127183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3257.136241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3257.144264] bridge0: port 2(bridge_slave_1) entered blocking state [ 3257.150690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3257.161066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3257.173636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3257.181709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3257.190050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3257.207899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3257.215210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3257.224178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3257.232642] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3257.251381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3257.261214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3257.269465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3257.284825] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3257.295984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3257.306564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3257.319396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3257.326409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3257.334068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3257.344512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3257.354031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3257.374908] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3257.383667] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3257.390048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3257.397493] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3257.411376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3257.431249] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3257.441746] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3257.449035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3257.457804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3257.539774] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3257.547595] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3257.555872] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3257.565854] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3257.572660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3257.580568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3257.588831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3257.596520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3257.605108] device veth0_vlan entered promiscuous mode [ 3257.617834] device veth1_vlan entered promiscuous mode [ 3257.623917] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3257.633203] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3257.648077] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3257.657742] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3257.665068] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3257.673456] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3257.681422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3257.689212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3257.699463] device veth0_macvtap entered promiscuous mode [ 3257.706809] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3257.716566] device veth1_macvtap entered promiscuous mode [ 3257.724512] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3257.734215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3257.744187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3257.754579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3257.764557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.774113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3257.783879] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.793329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3257.803257] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.812629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3257.822754] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.833091] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3257.842842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.853144] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3257.860705] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3257.867728] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3257.875665] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3257.883077] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3257.893044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3257.903185] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3257.913171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.922308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3257.932045] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.941204] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3257.951050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.960403] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3257.970112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.979278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3257.989040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3257.999466] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3258.006539] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3258.013941] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3258.022406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:01:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x39000000}) 04:01:13 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000020000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000f0000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:13 executing program 1 (fault-call:6 fault-nth:18): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:13 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000080)={0x9e0000, 0xba90, 0x101, r0, 0x0, &(0x7f0000000000)={0x990a91, 0xbc0, [], @value64=0x200}}) sendmsg$nl_generic(r5, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)={0x12f8, 0x21, 0x20, 0x70bd2b, 0x25dfdbfb, {0x3}, [@generic="1da99ceb2a089234f4ffe1d3c52e1d33ddfa04b4d73b1c2caf5bf39f06ca74512f0964de2ac245ee3ab093ad9ffa02169b343a3e9dca7933349aa892d238283fc81e7056f73092e8e6f1b5d3545cca3b030661287ca9df0dc937d2cf", @nested={0x12e, 0x2b, 0x0, 0x1, [@generic="261306f487ec33fddb22d07e7e81a89ae4bfe3c629ac93b219b30183a8da869c890f5f907963eded187e1d9b7ddbabc30cd0d482caf50b056b0c6bcbfdc8d9adc056c8ee4bdad713a0cd256d2a4cc6b7c75dc40c04c4aba36e3f84ac35ae6d9400eb852004d5ca7504ec25135319d49aeb8308451f268434f3f1a09987b602f372aa6a15e4f0f213de1259eb4fce5d25a2b0fed9e7c400aca60400c365c0a4bb4d0b1348d5905d298fc6ccedef82c17bf7c26a2aed69b42ad1ffa5c51d7623", @generic="a7c6889379c9fe870860fc6d14ec0374219b6432c36ae289b9ef5f3bdb3ef0dfaf7389bd51498e8d5e6d718cb37037fe8dc2ab1aa2ed70fd9903ea0f1ac686345b66da259471ae3a7ecf6d2784af695aa3295019a468929835463c425725b6a5ef3d81238e875641395f28"]}, @generic="a181", @typed={0x4, 0x26}, @generic="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", @nested={0x1004, 0x31, 0x0, 0x1, [@generic="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"]}, @typed={0xc, 0x5d, 0x0, 0x0, @u64=0x1}, @nested={0x41, 0x2f, 0x0, 0x1, [@typed={0xc, 0x19, 0x0, 0x0, @str='nl80211\x00'}, @typed={0x4, 0x2d}, @generic="049432a2ca1dd2d945841d9a0db312402864be881dbfe61ccee150876c3b20bc7d6f83b117695a0194ddd5fa68"]}]}, 0x12f8}}, 0x40884) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) write(r6, &(0x7f0000000280)="7af868d7e22ef608859b7ce596a5a6bcd8b2cd0ad1192b614d4361352f91cd9ba28305ac8086427eb11430eb95c9a109eeef969f6674866c81be08dc6fbfc0ac9b828ad56690fc911fdb7a0d09f192317c1ecce48e906a778216ff21abcad0d32827b4161db18dbb1dcfa34bf2bf726f7cc8727cabf8c7fa0bf2c1eebad2aa75f40221c3bc31bfdebba7be214aa4be57ea4d82", 0x93) [ 3258.246645] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3258.264790] f2fs_msg: 14 callbacks suppressed [ 3258.264804] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3258.286751] FAULT_INJECTION: forcing a failure. [ 3258.286751] name failslab, interval 1, probability 0, space 0, times 0 [ 3258.315554] CPU: 1 PID: 8379 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3258.323367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3258.332724] Call Trace: [ 3258.335326] dump_stack+0x188/0x20d [ 3258.336230] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3258.338963] should_fail.cold+0xa/0x1b [ 3258.338987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3258.339004] ? __lock_is_held+0xad/0x140 [ 3258.359489] __should_failslab+0x115/0x180 [ 3258.363739] should_failslab+0x5/0xf [ 3258.367466] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 3258.372153] ? dev_uevent_filter+0xd0/0xd0 [ 3258.374850] F2FS-fs (loop2): Invalid log sectors per block(2) log sectorsize(9) [ 3258.376409] kobject_uevent_env+0x225/0x1160 [ 3258.376434] lo_ioctl+0x1006/0x20e0 [ 3258.376450] ? lo_rw_aio+0x12f0/0x12f0 [ 3258.376478] blkdev_ioctl+0xbf7/0x1a1c [ 3258.395693] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3258.395839] ? blkpg_ioctl+0x9e0/0x9e0 [ 3258.405186] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3258.407144] ? mark_held_locks+0xf0/0xf0 [ 3258.407163] ? find_held_lock+0x2d/0x110 [ 3258.407179] ? debug_check_no_obj_freed+0x20a/0x42e [ 3258.407200] block_ioctl+0xe9/0x130 [ 3258.412647] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3258.418059] ? blkdev_fallocate+0x3f0/0x3f0 [ 3258.418075] do_vfs_ioctl+0xcda/0x12e0 [ 3258.418091] ? selinux_file_ioctl+0x46c/0x5d0 [ 3258.418109] ? selinux_file_ioctl+0x125/0x5d0 [ 3258.426160] F2FS-fs (loop2): Invalid log sectors per block(2) log sectorsize(9) [ 3258.426194] ? check_preemption_disabled+0x41/0x280 [ 3258.432943] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3258.434801] ? ioctl_preallocate+0x200/0x200 [ 3258.434820] ? selinux_file_mprotect+0x600/0x600 [ 3258.434837] ? __fget+0x340/0x510 [ 3258.468521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12002 sclass=netlink_route_socket pig=8393 comm=syz-executor.4 [ 3258.472013] ? iterate_fd+0x350/0x350 [ 3258.472023] ? putname+0xe1/0x120 [ 3258.472043] ? security_file_ioctl+0x6c/0xb0 [ 3258.472058] ksys_ioctl+0x9b/0xc0 [ 3258.472074] __x64_sys_ioctl+0x6f/0xb0 [ 3258.472089] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3258.472104] do_syscall_64+0xf9/0x620 [ 3258.472122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3258.472133] RIP: 0033:0x45c317 04:01:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3a000000}) [ 3258.472147] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3258.472154] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3258.472167] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045c317 [ 3258.472174] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3258.472181] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3258.472188] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 04:01:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000040030058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3258.472194] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000012 [ 3258.502963] device bond1438 entered promiscuous mode [ 3258.520756] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3258.623945] EXT4-fs (sda1): Remounting filesystem read-only 04:01:13 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000040000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3258.687265] bond1438: making interface bridge2576 the new active one [ 3258.726741] device bridge2576 entered promiscuous mode [ 3258.764164] bond1438: Enslaving bridge2576 as an active interface with an up link [ 3258.815835] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3258.837443] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:01:14 executing program 1 (fault-call:6 fault-nth:19): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3258.870473] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3258.909059] bond1438: Enslaving bridge2577 as an active interface with a down link 04:01:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c2, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:14 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000070000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3b000000}) 04:01:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000003400058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3259.022914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12002 sclass=netlink_route_socket pig=8393 comm=syz-executor.4 [ 3259.115240] FAULT_INJECTION: forcing a failure. [ 3259.115240] name failslab, interval 1, probability 0, space 0, times 0 [ 3259.131250] CPU: 1 PID: 8645 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3259.139074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3259.148426] Call Trace: [ 3259.151025] dump_stack+0x188/0x20d [ 3259.154681] should_fail.cold+0xa/0x1b [ 3259.158583] ? fault_create_debugfs_attr+0x1e0/0x1e0 04:01:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3c000000}) [ 3259.163695] ? __lock_is_held+0xad/0x140 [ 3259.167767] __should_failslab+0x115/0x180 [ 3259.172001] should_failslab+0x5/0xf [ 3259.175716] kmem_cache_alloc+0x29f/0x710 [ 3259.179868] ? kernfs_add_one+0x377/0x4d0 [ 3259.184023] __kernfs_new_node+0xd2/0x680 [ 3259.188171] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 3259.192932] ? __mutex_unlock_slowpath+0xea/0x670 [ 3259.197768] ? wait_for_completion+0x3c0/0x3c0 [ 3259.202334] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 3259.207596] kernfs_new_node+0x92/0x120 [ 3259.211555] __kernfs_create_file+0x51/0x33f [ 3259.215959] sysfs_add_file_mode_ns+0x224/0x520 [ 3259.220669] internal_create_group+0x359/0xb90 [ 3259.225268] ? lock_acquire+0x170/0x400 [ 3259.229239] ? remove_files.isra.0+0x190/0x190 [ 3259.233881] ? lock_downgrade+0x740/0x740 [ 3259.238035] lo_ioctl+0xf89/0x20e0 [ 3259.241563] ? lo_rw_aio+0x12f0/0x12f0 [ 3259.245442] blkdev_ioctl+0xbf7/0x1a1c [ 3259.253320] ? blkpg_ioctl+0x9e0/0x9e0 [ 3259.257210] ? mark_held_locks+0xf0/0xf0 [ 3259.261269] ? find_held_lock+0x2d/0x110 [ 3259.265345] ? debug_check_no_obj_freed+0x20a/0x42e [ 3259.270362] block_ioctl+0xe9/0x130 [ 3259.273977] ? blkdev_fallocate+0x3f0/0x3f0 [ 3259.278291] do_vfs_ioctl+0xcda/0x12e0 [ 3259.282182] ? selinux_file_ioctl+0x46c/0x5d0 [ 3259.286662] ? selinux_file_ioctl+0x125/0x5d0 [ 3259.291139] ? check_preemption_disabled+0x41/0x280 [ 3259.296161] ? ioctl_preallocate+0x200/0x200 [ 3259.300561] ? selinux_file_mprotect+0x600/0x600 [ 3259.305309] ? __fget+0x340/0x510 [ 3259.308759] ? iterate_fd+0x350/0x350 [ 3259.312547] ? putname+0xe1/0x120 [ 3259.315989] ? security_file_ioctl+0x6c/0xb0 [ 3259.320469] ksys_ioctl+0x9b/0xc0 [ 3259.323957] __x64_sys_ioctl+0x6f/0xb0 [ 3259.327828] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3259.332402] do_syscall_64+0xf9/0x620 [ 3259.336194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3259.341376] RIP: 0033:0x45c317 [ 3259.344571] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3259.363458] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3259.371150] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3259.378406] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3259.385707] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3259.392963] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3259.400224] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000013 04:01:14 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000090000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:14 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) dup(r4) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000140)) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3259.451259] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3259.458939] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3259.490598] EXT4-fs (sda1): Remounting filesystem read-only 04:01:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000006b6b6b0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3259.561882] audit: type=1800 audit(1583640074.680:895): pid=8707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16625 res=0 [ 3259.585483] device bond1439 entered promiscuous mode 04:01:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3d000000}) 04:01:14 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000000a0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3259.739169] bond1439: making interface bridge2578 the new active one [ 3259.769132] device bridge2578 entered promiscuous mode [ 3259.776310] bond1439: Enslaving bridge2578 as an active interface with an up link 04:01:14 executing program 1 (fault-call:6 fault-nth:20): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:14 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000000f0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3259.877923] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3259.911904] audit: type=1800 audit(1583640075.030:896): pid=8785 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16705 res=0 [ 3259.978550] bond1439: Enslaving bridge2579 as an active interface with a down link [ 3260.015602] FAULT_INJECTION: forcing a failure. [ 3260.015602] name failslab, interval 1, probability 0, space 0, times 0 04:01:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c3, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000fffff00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3e000000}) 04:01:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000100000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3260.040982] CPU: 1 PID: 8908 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3260.048789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3260.058144] Call Trace: [ 3260.060732] dump_stack+0x188/0x20d [ 3260.064387] should_fail.cold+0xa/0x1b [ 3260.068283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3260.073393] ? __lock_is_held+0xad/0x140 [ 3260.077469] __should_failslab+0x115/0x180 [ 3260.081702] should_failslab+0x5/0xf [ 3260.085412] __kmalloc+0x2d3/0x770 [ 3260.089085] ? kobject_get_path+0xb9/0x190 [ 3260.093334] ? rcu_read_lock_sched_held+0x10a/0x130 [ 3260.098365] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 3260.103224] kobject_get_path+0xb9/0x190 [ 3260.107298] kobject_uevent_env+0x24b/0x1160 [ 3260.111809] lo_ioctl+0x1006/0x20e0 [ 3260.115437] ? lo_rw_aio+0x12f0/0x12f0 [ 3260.119322] blkdev_ioctl+0xbf7/0x1a1c [ 3260.123203] ? blkpg_ioctl+0x9e0/0x9e0 [ 3260.127095] ? mark_held_locks+0xf0/0xf0 [ 3260.131148] ? find_held_lock+0x2d/0x110 [ 3260.135201] ? debug_check_no_obj_freed+0x20a/0x42e [ 3260.140218] block_ioctl+0xe9/0x130 [ 3260.143830] ? blkdev_fallocate+0x3f0/0x3f0 [ 3260.148140] do_vfs_ioctl+0xcda/0x12e0 [ 3260.152014] ? selinux_file_ioctl+0x46c/0x5d0 [ 3260.156495] ? selinux_file_ioctl+0x125/0x5d0 [ 3260.160978] ? check_preemption_disabled+0x41/0x280 [ 3260.165974] ? ioctl_preallocate+0x200/0x200 [ 3260.170369] ? selinux_file_mprotect+0x600/0x600 [ 3260.175110] ? __fget+0x340/0x510 [ 3260.178550] ? iterate_fd+0x350/0x350 [ 3260.182335] ? putname+0xe1/0x120 [ 3260.185777] ? security_file_ioctl+0x6c/0xb0 [ 3260.190173] ksys_ioctl+0x9b/0xc0 [ 3260.193630] __x64_sys_ioctl+0x6f/0xb0 [ 3260.197506] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3260.202079] do_syscall_64+0xf9/0x620 [ 3260.205867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3260.211057] RIP: 0033:0x45c317 [ 3260.214238] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3260.233125] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3260.240818] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045c317 [ 3260.248072] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3260.255326] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3260.262583] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3260.269839] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000014 [ 3260.337610] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3260.345549] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3f000000}) 04:01:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000158000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3260.382517] EXT4-fs (sda1): Remounting filesystem read-only [ 3260.441873] device bond1440 entered promiscuous mode 04:01:15 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0102c9000012000000050000e502573daf9ff8600000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000140000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3260.511842] bond1440: making interface bridge2580 the new active one [ 3260.533361] device bridge2580 entered promiscuous mode [ 3260.552312] bond1440: Enslaving bridge2580 as an active interface with an up link 04:01:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f201000700090000004e0000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3260.646117] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:15 executing program 1 (fault-call:6 fault-nth:21): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x40000000}) [ 3260.702862] audit: type=1800 audit(1583640075.810:897): pid=9041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16898 res=0 04:01:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000258000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3260.767555] audit: type=1800 audit(1583640075.810:898): pid=9050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16898 res=0 [ 3260.781781] bond1440: Enslaving bridge2581 as an active interface with a down link [ 3260.881060] FAULT_INJECTION: forcing a failure. [ 3260.881060] name failslab, interval 1, probability 0, space 0, times 0 04:01:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c4, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:16 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x0, 0x4, 0x0, 0x9, 0x0, 0x2000000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getuid() setreuid(0xee00, r0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x3, &(0x7f0000000280)=[{&(0x7f0000000140)="8dfdb966df692f7d248a8a0cd062eeb0aa2cdb5593eed386858574230cc68974c95720279abae2e4d83ab743884c907382ca770db7f7b71cdf150a03f6ad9fdd0fb401e72ef961d2c6bb2674f9", 0x4d, 0x1}, {&(0x7f00000001c0)="5ace63be176585b41dc2d95bae72047f3fb06ebcea5c6e631a2f42ccc055598676ea011ef25b55f0ca09ee83013a46489045c0589590ecdfa16b7d", 0x3b, 0x6}, {&(0x7f0000000200)="14b8c5ffce02985d85448ca75ee57464bdd32fb207ad31a10b280b31287aadda3c707fa7c396c085979f2160a6b8b5accbc240896c258a128217c9cb83feae", 0x3f, 0x200}], 0x80044, &(0x7f00000003c0)={[{@noinline_xattr='noinline_xattr'}, {@prjquota={'prjquota', 0x3d, '#bdev'}}, {@resuid={'resuid', 0x3d, r0}}, {@lazytime='lazytime'}, {@user_xattr='user_xattr'}, {@resuid={'resuid', 0x3d, r1}}], [{@obj_role={'obj_role'}}, {@appraise='appraise'}, {@fsname={'fsname'}}]}) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000530000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3260.961240] CPU: 1 PID: 9173 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3260.969067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3260.978422] Call Trace: [ 3260.981024] dump_stack+0x188/0x20d [ 3260.984679] should_fail.cold+0xa/0x1b [ 3260.988578] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3260.993686] ? __lock_is_held+0xad/0x140 [ 3260.997766] __should_failslab+0x115/0x180 [ 3261.002005] should_failslab+0x5/0xf [ 3261.005813] kmem_cache_alloc_node_trace+0x272/0x750 04:01:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x41000000}) [ 3261.010933] __kmalloc_node_track_caller+0x38/0x70 [ 3261.015873] __kmalloc_reserve.isra.0+0x39/0xe0 [ 3261.020556] __alloc_skb+0xef/0x5b0 [ 3261.024178] ? skb_trim+0x180/0x180 [ 3261.027789] ? check_preemption_disabled+0x41/0x280 [ 3261.032799] alloc_uevent_skb+0x7b/0x210 [ 3261.036866] kobject_uevent_env+0x8f0/0x1160 [ 3261.041270] lo_ioctl+0x1006/0x20e0 [ 3261.044882] ? lo_rw_aio+0x12f0/0x12f0 [ 3261.048755] blkdev_ioctl+0xbf7/0x1a1c [ 3261.052653] ? blkpg_ioctl+0x9e0/0x9e0 [ 3261.056533] ? mark_held_locks+0xf0/0xf0 [ 3261.060602] ? find_held_lock+0x2d/0x110 [ 3261.064667] ? debug_check_no_obj_freed+0x20a/0x42e [ 3261.069685] block_ioctl+0xe9/0x130 [ 3261.073307] ? blkdev_fallocate+0x3f0/0x3f0 [ 3261.077650] do_vfs_ioctl+0xcda/0x12e0 [ 3261.081557] ? selinux_file_ioctl+0x46c/0x5d0 [ 3261.086162] ? selinux_file_ioctl+0x125/0x5d0 [ 3261.090646] ? check_preemption_disabled+0x41/0x280 [ 3261.095654] ? ioctl_preallocate+0x200/0x200 [ 3261.100054] ? selinux_file_mprotect+0x600/0x600 [ 3261.104790] ? __fget+0x340/0x510 [ 3261.108223] ? iterate_fd+0x350/0x350 [ 3261.112011] ? putname+0xe1/0x120 [ 3261.115463] ? security_file_ioctl+0x6c/0xb0 [ 3261.119865] ksys_ioctl+0x9b/0xc0 [ 3261.123303] __x64_sys_ioctl+0x6f/0xb0 [ 3261.127215] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3261.131800] do_syscall_64+0xf9/0x620 [ 3261.135594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3261.140778] RIP: 0033:0x45c317 [ 3261.143993] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3261.163006] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3261.170708] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045c317 [ 3261.177979] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3261.185286] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3261.192550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3261.199850] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000015 [ 3261.240288] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3261.255224] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3261.281418] EXT4-fs (sda1): Remounting filesystem read-only 04:01:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000230200000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000358000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3261.412167] device bond1441 entered promiscuous mode 04:01:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xe4ffffff}) 04:01:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000d00300000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3261.628892] bond1441: making interface bridge2582 the new active one 04:01:16 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000500)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = getuid() setreuid(0xee00, r2) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000280)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x2b6b}}], [{@fsname={'fsname', 0x3d, '\xcausercpuset:cgrouptrusted'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfshat={'smackfshat', 0x3d, 'wlan1'}}]}}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000006fec32dca7798fb018287ee720e494f3af37916888e6f2346db46589303e6071abed03fdb8ada0c6ee7cca1a5b595f713294af6c2857e0b228b204", @ANYRES16=r3, @ANYBLOB="080000009b0000070000004008171a0002000000e042820870bd5180556595a8d15be1ee7fdb5bdcf0a7cecfb9842c709548e60025fdb8d3803775ec2d60223bdf911ef7951ee75d9300"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r4 = getuid() setreuid(0xee00, r4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4800, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x1c, &(0x7f00000005c0)={@mcast2, 0x0}, &(0x7f0000000600)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001c00)=@newchain={0x4b4, 0x64, 0x200, 0x170bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r10, {0xffff}, {0xb, 0x8}, {0xa, 0xe}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_KEY_CVLAN_ETH_TYPE={0x6, 0x4f, 0x88a8}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x468, 0x2, [@TCA_U32_MARK={0x10, 0xa, {0xffff, 0x9}}, @TCA_U32_CLASSID={0x8, 0x1, {0xa, 0xfff3}}, @TCA_U32_POLICE={0x44c, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1ff, 0x0, 0x7, 0x8, 0x81, 0x3, 0x10001, 0x10cd3cda, 0x8, 0x5, 0x6, 0x100, 0x3, 0x8, 0x7, 0x800, 0x64, 0x3, 0x6, 0x8000000, 0x400, 0x0, 0x81, 0x8001, 0x20, 0x10001, 0x8, 0x5, 0x6, 0x1000, 0xffff, 0xffffffff, 0x1, 0x5, 0x1ff, 0x80000000, 0x40, 0x2, 0x5, 0x3f, 0x5, 0x401e, 0x2, 0x4b8, 0x0, 0x8, 0x9db, 0x58d, 0x3f, 0xfffffffb, 0x1, 0x6, 0x3, 0xb3bc, 0x5, 0x1f, 0x750, 0x3ff, 0x8, 0x10000, 0x4, 0x0, 0x7c7, 0x5, 0x80, 0x27, 0x7f, 0x6, 0x6221, 0x0, 0x4, 0x2, 0x0, 0x3, 0xa43, 0x8, 0x80000000, 0x7, 0xff, 0x0, 0x800, 0x7, 0xfff, 0x2, 0x80, 0x7fff, 0x5e87, 0x9, 0x14000000, 0x59, 0x2, 0xab, 0x8, 0x7, 0x4, 0x2, 0x9, 0x4, 0x0, 0x7f, 0x80000000, 0x7fffffff, 0x5, 0xffffffff, 0x3, 0x80000000, 0x81, 0x4329, 0x75, 0x9, 0x1, 0x1, 0x1ff, 0x8, 0xfffffff8, 0x8cd, 0x9, 0x2, 0x2, 0x2, 0x400, 0x800, 0x1f, 0x3, 0x1, 0xc425, 0x8, 0x2, 0x2000, 0x2, 0x7, 0xfffffffd, 0xd55, 0x5, 0x6, 0x915a, 0x7fff, 0x0, 0x1c000, 0x7, 0x80000000, 0x7fffffff, 0x6, 0x80000000, 0x2, 0x0, 0x3, 0x8, 0x7, 0x762, 0x0, 0x3, 0x200, 0x8, 0x5df, 0x295, 0x2, 0xb2d5, 0x1000, 0x5, 0x0, 0x101, 0x7fff, 0x12d, 0x4, 0x7, 0x6da8, 0x8, 0x7, 0x7, 0x8, 0x200, 0x8, 0x3, 0x5, 0x0, 0x1, 0x9, 0x8, 0x2, 0x2, 0x3, 0xa3f80, 0x596, 0xff, 0xff, 0x8, 0x2, 0x1, 0xc95, 0x75e9, 0x4, 0xfc, 0x8000, 0x8000, 0xfffffffb, 0x8, 0xfffff753, 0xe888, 0xec9, 0x23d2, 0x400, 0x7f, 0x5, 0x6, 0x8, 0x7, 0xfffffff7, 0x3f, 0xe7d4, 0x3, 0x8, 0xfffffffd, 0x6, 0x1, 0x6, 0x9, 0x5, 0xffffffff, 0x0, 0x9, 0x2, 0xffff, 0x7ab, 0x8, 0x6, 0x0, 0x1, 0x1000, 0x45, 0x1ff, 0x4, 0x80000000, 0x7, 0x8, 0x7ff, 0x6, 0x7, 0xc550, 0x40, 0x8001, 0x6, 0x1000, 0x5b, 0x4, 0xf04e, 0x4, 0x38, 0x7, 0x3, 0x8b, 0x2b97, 0x20, 0x1, 0x9, 0x40]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x81, 0x1, 0x4, 0x2, 0xffff, {0x8, 0x1, 0x4, 0x100, 0x8, 0x4}, {0xfd, 0x0, 0x900, 0x100, 0x200, 0x2}, 0x7, 0x8, 0x5}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3ff}]}]}}]}, 0x4b4}}, 0x1) r11 = dup3(r8, r9, 0x0) sendmsg$IPSET_CMD_DESTROY(r11, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x3, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004009}, 0x20000010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = fcntl$dupfd(r13, 0x0, r11) sendmsg$nl_route(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="001b00000000000000e0c8", @ANYRES64=r7, @ANYBLOB="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"], 0x3}}, 0x1) chown(&(0x7f0000000200)='./file0\x00', r4, r7) [ 3261.672987] device bridge2582 entered promiscuous mode [ 3261.682063] bond1441: Enslaving bridge2582 as an active interface with an up link 04:01:16 executing program 1 (fault-call:6 fault-nth:22): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000004200000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3261.746853] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xf0ffffff}) [ 3261.836715] bond1441: Enslaving bridge2583 as an active interface with a down link [ 3261.845839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pig=9459 comm=syz-executor.4 04:01:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c5, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3261.909424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pig=9461 comm=syz-executor.4 [ 3261.911627] FAULT_INJECTION: forcing a failure. [ 3261.911627] name failslab, interval 1, probability 0, space 0, times 0 [ 3261.934590] CPU: 0 PID: 9457 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3261.942389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3261.951741] Call Trace: [ 3261.954339] dump_stack+0x188/0x20d [ 3261.957988] should_fail.cold+0xa/0x1b [ 3261.961883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3261.966993] ? __lock_is_held+0xad/0x140 [ 3261.971062] __should_failslab+0x115/0x180 [ 3261.975313] should_failslab+0x5/0xf [ 3261.979009] kmem_cache_alloc+0x29f/0x710 [ 3261.983138] ? lock_downgrade+0x740/0x740 [ 3261.987320] skb_clone+0x14f/0x3d0 [ 3261.990852] netlink_broadcast_filtered+0x889/0xb50 [ 3261.995860] netlink_broadcast+0x35/0x40 [ 3261.999908] kobject_uevent_env+0x8b6/0x1160 [ 3262.004414] lo_ioctl+0x1006/0x20e0 [ 3262.008026] ? lo_rw_aio+0x12f0/0x12f0 [ 3262.011897] blkdev_ioctl+0xbf7/0x1a1c [ 3262.015772] ? blkpg_ioctl+0x9e0/0x9e0 [ 3262.019692] ? mark_held_locks+0xf0/0xf0 [ 3262.023739] ? find_held_lock+0x2d/0x110 [ 3262.027784] ? debug_check_no_obj_freed+0x20a/0x42e [ 3262.032788] block_ioctl+0xe9/0x130 [ 3262.036398] ? blkdev_fallocate+0x3f0/0x3f0 [ 3262.040702] do_vfs_ioctl+0xcda/0x12e0 [ 3262.044571] ? selinux_file_ioctl+0x46c/0x5d0 [ 3262.049044] ? selinux_file_ioctl+0x125/0x5d0 [ 3262.053520] ? check_preemption_disabled+0x41/0x280 [ 3262.058641] ? ioctl_preallocate+0x200/0x200 [ 3262.063030] ? selinux_file_mprotect+0x600/0x600 [ 3262.067767] ? __fget+0x340/0x510 [ 3262.071206] ? iterate_fd+0x350/0x350 [ 3262.074990] ? putname+0xe1/0x120 [ 3262.078429] ? security_file_ioctl+0x6c/0xb0 [ 3262.082820] ksys_ioctl+0x9b/0xc0 [ 3262.086265] __x64_sys_ioctl+0x6f/0xb0 [ 3262.090139] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3262.094707] do_syscall_64+0xf9/0x620 [ 3262.098496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3262.103669] RIP: 0033:0x45c317 [ 3262.106844] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3262.125744] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3262.133481] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045c317 [ 3262.140785] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 3262.148167] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a 04:01:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000458000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:17 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x9}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x48040) [ 3262.155418] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3262.162668] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000016 [ 3262.184107] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:17 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003000000010000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3262.243316] EXT4-fs (sda1): Remounting filesystem read-only [ 3262.280589] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:17 executing program 1 (fault-call:6 fault-nth:23): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3262.406599] device bond1442 entered promiscuous mode 04:01:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfdfdffff}) 04:01:17 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000b0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3262.489924] bond1442: making interface bridge2584 the new active one [ 3262.500464] device bridge2584 entered promiscuous mode [ 3262.506791] bond1442: Enslaving bridge2584 as an active interface with an up link 04:01:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000a58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:17 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f00000002c0)="96751ddcecb13ce8ba2f4103ed9995c18d6a25e07d9dd08456a897c22ff393351a4ab0766be7bce72032b9dcdc40bc8e0394ee98e92242853fcde3b6c8fc76f71a8a731c464667aa33ec", 0x4a}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000340)="ee86b72800", 0x5}, {&(0x7f0000000380)="6b90ebbad9a6e990178a4a708ff87b392aae4ddac2dd01f5594cba8f6b817c77945591f6a48db18bff5ba75a116a7c1ff49e60fe625427efa09b0f2726d6901b5a0a431e7a5cc93a8d52ae62a5ab7d721805cd94ee617abf2e7e43813506c25c91840d58519172db442e8c55893ccd7ee0715cbb67cf63f39db5ed5254a625a43a0701877ae944ae9fb389", 0x8b}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000000440)="28bbb47fd8d6af630b6a4d62c83e06dd02cf8ebe93b16dc0050503822237f02a5196f112159e0aced84b28f958", 0x2d}], 0x6, 0x6) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000540)) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000500)) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = dup(r5) sendmsg$AUDIT_USER(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xa4, 0x3ed, 0x20, 0x70bd29, 0x25dfdbfd, "4f75f89983fe9152a526f3275f5c4a9bfa0c8663a97ab40f0888035ac1af79661de39c6f582ffd6cabcc4a20d4692f62df8a4f9686ea1278f7340f16fe4f48513e5d323213af294b135e4659a71160ad0bd59d7f177bd8543053f952b6ee470aa15f789268ef9e1a12cda3abe1a2420a33f71a5b8903033a8c389292ecc3f16543b5a94d4365e719e018153043f0f794699fe5", ["", "", ""]}, 0xa4}}, 0x34000808) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r7, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x507000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r8, 0xc0245720, &(0x7f00000005c0)={0x1}) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) [ 3262.567081] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3262.606253] FAULT_INJECTION: forcing a failure. [ 3262.606253] name failslab, interval 1, probability 0, space 0, times 0 [ 3262.635750] CPU: 1 PID: 9592 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3262.643568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3262.652924] Call Trace: [ 3262.655516] dump_stack+0x188/0x20d [ 3262.659154] should_fail.cold+0xa/0x1b [ 3262.663048] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3262.668162] __should_failslab+0x115/0x180 [ 3262.672402] should_failslab+0x5/0xf [ 3262.676117] kmem_cache_alloc+0x29f/0x710 [ 3262.680273] ? __fget+0x340/0x510 [ 3262.683738] getname_flags+0xd2/0x5b0 [ 3262.687549] do_mkdirat+0x8d/0x280 [ 3262.691103] ? __ia32_sys_mknod+0xb0/0xb0 [ 3262.695257] ? fput+0x2b/0x190 [ 3262.698472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3262.703249] ? trace_hardirqs_off_caller+0x55/0x210 [ 3262.708271] ? do_syscall_64+0x21/0x620 [ 3262.712264] do_syscall_64+0xf9/0x620 [ 3262.716098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3262.721292] RIP: 0033:0x45b8c7 04:01:17 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030200000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3262.724495] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3262.743404] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3262.751124] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045b8c7 [ 3262.758396] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 3262.765666] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3262.772939] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 04:01:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfeffffff}) [ 3262.780212] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000017 [ 3262.791107] bond1442: Enslaving bridge2585 as an active interface with a down link 04:01:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c6, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:18 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030300000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000e58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xff0f0000}) 04:01:18 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030400000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3263.086332] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3263.131693] EXT4-fs (sda1): Remounting filesystem read-only [ 3263.268841] device bond1443 entered promiscuous mode [ 3263.359730] bond1443: making interface bridge2586 the new active one [ 3263.389171] device bridge2586 entered promiscuous mode 04:01:18 executing program 1 (fault-call:6 fault-nth:24): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:18 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030500000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfffffdfd}) 04:01:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000001f58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3263.410139] bond1443: Enslaving bridge2586 as an active interface with an up link [ 3263.474860] f2fs_msg: 134 callbacks suppressed [ 3263.474872] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3263.486832] validate_nla: 1 callbacks suppressed [ 3263.486841] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:18 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010200000000000000001b00000008009a0600000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(0xffffffffffffffff, 0x40044104, &(0x7f0000000000)=0xbe9) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) accept4$phonet_pipe(r3, &(0x7f0000000080), &(0x7f0000000140)=0x10, 0x0) [ 3263.535205] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3263.561622] F2FS-fs (loop2): Invalid log sectors per block(1283) log sectorsize(9) [ 3263.591604] bond1443: Enslaving bridge2587 as an active interface with a down link [ 3263.599465] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3263.617110] FAULT_INJECTION: forcing a failure. [ 3263.617110] name failslab, interval 1, probability 0, space 0, times 0 [ 3263.639800] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3263.657624] audit: type=1800 audit(1583640078.770:899): pid=9856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16760 res=0 [ 3263.671323] CPU: 1 PID: 9861 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3263.688367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3263.697727] Call Trace: [ 3263.698173] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3263.700321] dump_stack+0x188/0x20d [ 3263.700342] should_fail.cold+0xa/0x1b [ 3263.700359] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3263.700398] __should_failslab+0x115/0x180 [ 3263.700411] should_failslab+0x5/0xf [ 3263.700432] kmem_cache_alloc+0x29f/0x710 [ 3263.732535] ? __fget+0x340/0x510 [ 3263.732873] F2FS-fs (loop2): Invalid log sectors per block(1283) log sectorsize(9) [ 3263.736006] getname_flags+0xd2/0x5b0 [ 3263.736025] do_mkdirat+0x8d/0x280 [ 3263.749930] audit: type=1800 audit(1583640078.810:900): pid=9860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16760 res=0 [ 3263.751058] ? __ia32_sys_mknod+0xb0/0xb0 [ 3263.751072] ? fput+0x2b/0x190 [ 3263.751088] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3263.751105] ? trace_hardirqs_off_caller+0x55/0x210 [ 3263.791010] ? do_syscall_64+0x21/0x620 [ 3263.793075] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3263.794996] do_syscall_64+0xf9/0x620 [ 3263.795015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3263.795029] RIP: 0033:0x45b8c7 [ 3263.814623] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3263.833536] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 04:01:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xffffffe4}) 04:01:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c7, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000003f58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3263.841251] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045b8c7 [ 3263.848527] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 3263.855804] RBP: 000000000076bfc0 R08: 0000000000000000 R09: 000000000000000a [ 3263.863077] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3263.870357] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000018 [ 3263.902920] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3263.913750] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:19 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030600000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3263.945655] EXT4-fs (sda1): Remounting filesystem read-only 04:01:19 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRESDEC=r0, @ANYBLOB="0102000000810000009bbf42ca5a509d41dcd8c34e00"], 0x3}}, 0x0) epoll_create1(0x0) accept4$unix(r2, &(0x7f0000000140), &(0x7f0000000000)=0x6e, 0x800) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3264.043112] device bond1444 entered promiscuous mode 04:01:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfffffff0}) [ 3264.091220] bond1444: making interface bridge2588 the new active one [ 3264.100152] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3264.110783] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3264.118300] device bridge2588 entered promiscuous mode 04:01:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000014058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3264.149730] audit: type=1400 audit(1583640079.260:901): avc: denied { accept } for pid=10026 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3264.179849] bond1444: Enslaving bridge2588 as an active interface with an up link 04:01:19 executing program 1 (fault-call:6 fault-nth:25): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:19 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030700000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3264.229968] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:19 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40000, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r5 = socket(0x27, 0x3, 0x0) setsockopt$inet_int(r5, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local, r6}, 0xc) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042bbd7000fbdbdf25110000000a00060000000000000000000c009900030000000400000000050029000a00000008000300"/66, @ANYRES32=r6, @ANYBLOB="08001180040007001200bd00be0006008b180100c700070020000000"], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0xc000) 04:01:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfffffffe}) [ 3264.403552] bond1444: Enslaving bridge2589 as an active interface with a down link 04:01:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c8, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3264.448983] FAULT_INJECTION: forcing a failure. [ 3264.448983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3264.460816] CPU: 0 PID: 10113 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3264.468706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3264.478065] Call Trace: [ 3264.480670] dump_stack+0x188/0x20d [ 3264.484316] should_fail.cold+0xa/0x1b [ 3264.488226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3264.493351] ? mark_held_locks+0xf0/0xf0 [ 3264.497434] __alloc_pages_nodemask+0x1c7/0x6a0 [ 3264.502124] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 3264.507154] ? debug_check_no_obj_freed+0x20a/0x42e [ 3264.512287] ? fs_reclaim_acquire+0x10/0x10 [ 3264.513231] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3264.516617] ? should_fail+0x142/0x7bc [ 3264.516636] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3264.516655] cache_grow_begin+0x8e/0x8a0 [ 3264.516668] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3264.516685] kmem_cache_alloc+0x648/0x710 [ 3264.545948] getname_flags+0xd2/0x5b0 04:01:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x8000000000000}) [ 3264.549762] do_mkdirat+0x8d/0x280 [ 3264.553332] ? __ia32_sys_mknod+0xb0/0xb0 [ 3264.557502] ? fput+0x2b/0x190 [ 3264.560703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3264.565463] ? trace_hardirqs_off_caller+0x55/0x210 [ 3264.570508] ? do_syscall_64+0x21/0x620 [ 3264.574496] do_syscall_64+0xf9/0x620 [ 3264.578322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3264.583517] RIP: 0033:0x45b8c7 [ 3264.586717] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3264.605806] RSP: 002b:00007f8b11480a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 3264.613524] RAX: ffffffffffffffda RBX: 00007f8b114816d4 RCX: 000000000045b8c7 [ 3264.620798] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 3264.628064] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 3264.635350] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3264.642622] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000019 04:01:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x100000000000000}) 04:01:19 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030800000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3264.659104] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3264.670532] EXT4-fs (sda1): Remounting filesystem read-only [ 3264.747903] device bond1445 entered promiscuous mode 04:01:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x200000000000000}) 04:01:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000006058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030900000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3264.891363] bond1445: making interface bridge2590 the new active one [ 3264.913346] device bridge2590 entered promiscuous mode [ 3264.932789] bond1445: Enslaving bridge2590 as an active interface with an up link 04:01:20 executing program 1 (fault-call:6 fault-nth:26): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000006b6b6b58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3265.127031] bond1445: Enslaving bridge2591 as an active interface with a down link [ 3265.139108] audit: type=1800 audit(1583640080.250:902): pid=10249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16994 res=0 [ 3265.145102] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3265.171105] FAULT_INJECTION: forcing a failure. [ 3265.171105] name failslab, interval 1, probability 0, space 0, times 0 [ 3265.182706] CPU: 0 PID: 10367 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3265.190593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3265.199948] Call Trace: [ 3265.202547] dump_stack+0x188/0x20d [ 3265.206195] should_fail.cold+0xa/0x1b [ 3265.210099] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3265.215215] ? find_held_lock+0x2d/0x110 [ 3265.219293] __should_failslab+0x115/0x180 [ 3265.223529] should_failslab+0x5/0xf [ 3265.227234] kmem_cache_alloc+0x44/0x710 [ 3265.231288] ? check_preemption_disabled+0x41/0x280 [ 3265.236303] __sigqueue_alloc+0x25c/0x4d0 [ 3265.240446] __send_signal+0x21e/0x14c0 [ 3265.244412] force_sig_info+0x248/0x300 [ 3265.248384] force_sig_info_fault.constprop.0+0x1dc/0x310 [ 3265.253912] ? is_prefetch.isra.0+0x420/0x420 [ 3265.258405] ? lock_downgrade+0x740/0x740 [ 3265.262542] ? __lock_is_held+0xad/0x140 [ 3265.266594] __bad_area_nosemaphore+0x2e6/0x400 [ 3265.271253] ? up_read+0x17/0x110 [ 3265.274699] __do_page_fault+0xa64/0xdd0 [ 3265.278756] ? trace_hardirqs_off_caller+0x55/0x210 [ 3265.283764] ? vmalloc_fault+0x730/0x730 [ 3265.287819] ? page_fault+0x8/0x30 [ 3265.291357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3265.296191] ? page_fault+0x8/0x30 [ 3265.299723] page_fault+0x1e/0x30 [ 3265.303168] RIP: 0033:0x4560af [ 3265.306350] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f 04:01:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030a00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:20 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) accept4$tipc(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x80000) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3265.325239] RSP: 002b:00007f8b1145fa68 EFLAGS: 00010283 [ 3265.330585] RAX: 00007f8b1145fb40 RBX: 00007f8b114606d4 RCX: 0000000000000000 [ 3265.337854] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f8b1145fb40 [ 3265.345115] RBP: 000000000076bfc0 R08: 00000000000000e0 R09: 000000000076bfc0 [ 3265.352369] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3265.359623] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001a 04:01:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19c9, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x300000000000000}) [ 3265.419124] audit: type=1800 audit(1583640080.280:903): pid=10335 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16994 res=0 04:01:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000ffffff9e58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000031000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3265.628850] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3265.639310] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3265.647087] audit: type=1800 audit(1583640080.760:904): pid=10487 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17089 res=0 04:01:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x400000000000000}) [ 3265.685782] EXT4-fs (sda1): Remounting filesystem read-only 04:01:20 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000031100000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:20 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="01000000", @ANYRES16=r2, @ANYBLOB="010200000000000000001b00000008009a0002000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3265.747990] device bond1446 entered promiscuous mode 04:01:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000ec058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3265.845209] bond1446: making interface bridge2592 the new active one [ 3265.871781] device bridge2592 entered promiscuous mode [ 3265.888420] bond1446: Enslaving bridge2592 as an active interface with an up link [ 3265.924270] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3266.018547] device bond1447 entered promiscuous mode 04:01:21 executing program 1 (fault-call:6 fault-nth:27): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000032200000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x500000000000000}) 04:01:21 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x2, &(0x7f00000004c0)=[{0x7f, 0x5, 0x7, 0x1}, {0xffff, 0x7, 0x3f, 0xff}]}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000440)={0x9, [0x9, 0x6, 0x6a6d, 0x8, 0x8, 0x3ff, 0xffff, 0x1, 0x8001]}, &(0x7f0000000480)=0x16) open(&(0x7f0000000140)='./file0\x00', 0xd69040, 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000400)={0x9c0000, 0x2, 0x9, r0, 0x0, &(0x7f00000003c0)={0x9f0901, 0x1, [], @p_u8=&(0x7f0000000380)=0x9}}) sendmsg$nl_netfilter(r8, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000001d00)={0x15d4, 0x13, 0xa, 0x0, 0x70bd29, 0x25dfdbfe, {0x2, 0x0, 0xa}, [@nested={0x1135, 0x8d, 0x0, 0x1, [@generic="6d5bb1551ea269da80fb127a1d8d2acb06b58862af8cd12e75cd03f129b9f04ddd3f6a5d8b40534239b4cd68ac4a0a72f025c6ea3cb6ac8f78ed6849e439679f6f7675be3fd27667d1415d8384499f8386f339ffccd60e123fbded246482e564949f7943ac5a4998fe5e5d2b8640fbccdc732c4124eb478ee478a8e165172efd486dbb93d1c3169a23851ec8c08f16195519d40161d24d3fbd6f7014048d244961eb73c60b065e9986b821ebd605d19102", @typed={0x10, 0x1, 0x0, 0x0, @str='securityem1\x00'}, @generic="8c958efa0673d6eac9405cf22dce3670ed1f3baf587137ee9eac1e7a02d21bdc7247ba12ab5199f99e3ab35240646319d13afc760222feede3a4bf98856ba1e1f0cfa3c7299ac7e248ec85830d60294895726fdb945e97a154be6dac", @generic="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", @typed={0xa, 0x5b, 0x0, 0x0, @str='vlan0\x00'}, @typed={0x8, 0x2f, 0x0, 0x0, @pid=r5}]}, @nested={0x144, 0x33, 0x0, 0x1, [@typed={0xb0, 0x2f, 0x0, 0x0, @binary="45d83325ad39e05e59ed39b8c6ee6bf91f0f5d0ca23d5bde1c1d66793a4c27d01ad1be7d3b2e67595265134aa3669cbb95c4fa9873091eec2eb729f8383200e3f2697ebdf2e918e209b30a9be324b43011b238a5228b7428c4dbafc6c09abe46717dc85a8d5fb78e4c84ca16771d1fca5f4cef4f2160709cbfdd33c3057b91d64576c74c2c207a4de43b2851e6618baeb27863517d14b341f85761e2a755eeee14b9605a363766da0f146033"}, @generic="12c557a20bfe69f623899da0322828944f7ff782e330b0c34d3639da2ee7bcf1cf19c35af91357de0168a0ddca670dffd50f28c67a17dc7bb9aebc03413f98ee02c1fcc5179a95e80cd52e0a319e80bf5a1aff2143627948e01f579dd17a205ed068c2bd0c525aabf6d8b1770017b043fbb720d3e8bd60befa26909650a05ed2bbe9520cb24ff75be1e4937296b4179e"]}, @typed={0x8, 0x19, 0x0, 0x0, @uid=r6}, @generic="5337c1c58150f9ea53e3c7de13f80af6deeaa7b3d7b2", @generic="1dc459228328584ff864f6dfc90dfdb253ee8aeb6623f298fa7bfd91a210d494b5bf68d33e2a060e51af754d8b3d633054e75d58188bf1912c7c034f2e34c18399837c25d6da287fc88bd8818dde58a6378b00894c95a721a320ec8609250d6d26bf0768222f6a7940", @generic="d47228c847b0552f6a4f", @typed={0x101, 0x6b, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x17, 0x0, 0x0, @u32=0x8}, @nested={0x1a2, 0x6d, 0x0, 0x1, [@generic="ae25f94ed177461cbe39d93141ab6949d26e79b33c0b41fb8c556ce6826855452181598b7b145bb4d90d3d978ff331", @generic="95f789063db1d984f34b18698b8bcc55b3b0428fcb2eec099f0243f12173a732c07db391de3253eceede8df0b943b18e4563d0d6f3c5d8a0cc692c5be32e60ff478164e720fb1097a408fcbf3b96f5b1b36b5ff5eb377be11ab39f18299da274f1b6e4d574fd40d34f5908691c5e5aa198061a4e1979bc6e0902bfdfae7c3dad8456ea99dd589b2afbf6379ce1e52bd998a6fc3221a155ec55aeba992ccd711365fc684c1b4aa0600369e71263c38f817e14d1346396f40ee0033b7d6baf7c522672fe3bff968db951666e7339519d47c793563497a2615dac6ff09b1b85b03c0351f4080247a6", @generic="53e5cc55d0db93872062ca4963af85d65fc2a28250f6f38153c2c4b1e4435d22b72d73a6fba87e94f5d28d954e2cb69d2f0b889dbfc3841ef8f558e27d80aa1943652f406d62ebe88ffd5ae668ff93284c17206b837aaf60ab2dd10099cf52f5336278f4b52fc2d3a63945ec3f9faccc54ef9d8e87a92e2b9cf8f9e8024f1bd9", @typed={0x8, 0x59, 0x0, 0x0, @uid=r7}]}]}, 0x15d4}, 0x1, 0x0, 0x0, 0x20000800}, 0x41) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)={0x3, 'vlan0\x00', {0x8}, 0x1}) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) clock_getres(0x5, &(0x7f0000000000)) 04:01:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19ca, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000032300000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000005dc458000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3266.215056] audit: type=1800 audit(1583640081.330:905): pid=10659 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16546 res=0 [ 3266.298307] FAULT_INJECTION: forcing a failure. [ 3266.298307] name failslab, interval 1, probability 0, space 0, times 0 [ 3266.303119] audit: type=1800 audit(1583640081.330:906): pid=10739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16546 res=0 [ 3266.309528] CPU: 1 PID: 10751 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3266.340318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3266.349672] Call Trace: [ 3266.352269] dump_stack+0x188/0x20d [ 3266.355908] should_fail.cold+0xa/0x1b [ 3266.359804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3266.363224] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3266.364918] ? find_held_lock+0x2d/0x110 [ 3266.364941] __should_failslab+0x115/0x180 [ 3266.380565] should_failslab+0x5/0xf [ 3266.384287] kmem_cache_alloc+0x44/0x710 [ 3266.388362] ? check_preemption_disabled+0x41/0x280 [ 3266.393394] __sigqueue_alloc+0x25c/0x4d0 [ 3266.397548] __send_signal+0x21e/0x14c0 [ 3266.401533] force_sig_info+0x248/0x300 [ 3266.405525] force_sig_info_fault.constprop.0+0x1dc/0x310 [ 3266.411074] ? is_prefetch.isra.0+0x420/0x420 [ 3266.415593] ? lock_downgrade+0x740/0x740 [ 3266.419774] ? __lock_is_held+0xad/0x140 [ 3266.423836] __bad_area_nosemaphore+0x2e6/0x400 [ 3266.425916] device bond1448 entered promiscuous mode [ 3266.428505] ? up_read+0x17/0x110 [ 3266.428523] __do_page_fault+0xa64/0xdd0 [ 3266.428541] ? trace_hardirqs_off_caller+0x55/0x210 [ 3266.446126] ? vmalloc_fault+0x730/0x730 [ 3266.450196] ? page_fault+0x8/0x30 [ 3266.453753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3266.458613] ? page_fault+0x8/0x30 [ 3266.462170] page_fault+0x1e/0x30 [ 3266.465632] RIP: 0033:0x4560af [ 3266.468831] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 3266.487734] RSP: 002b:00007f8b11480a68 EFLAGS: 00010283 04:01:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x600000000000000}) 04:01:21 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x5, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000032c00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3266.493108] RAX: 00007f8b11480b40 RBX: 00007f8b114816d4 RCX: 0000000000000000 [ 3266.500380] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f8b11480b40 [ 3266.507654] RBP: 000000000076bf20 R08: 00000000000000e0 R09: 000000000076bf20 [ 3266.514932] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3266.522205] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001b [ 3266.559731] bond1448: making interface bridge2594 the new active one [ 3266.592678] device bridge2594 entered promiscuous mode [ 3266.608537] bond1448: Enslaving bridge2594 as an active interface with an up link 04:01:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000034800000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000000e058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3266.656008] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3266.702906] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3266.717420] EXT4-fs (sda1): Remounting filesystem read-only [ 3266.755259] bond1448: Enslaving bridge2595 as an active interface with a down link 04:01:21 executing program 1 (fault-call:6 fault-nth:28): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x700000000000000}) 04:01:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19cb, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:21 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/155, &(0x7f0000000080)=0x9b) openat(0xffffffffffffffff, 0x0, 0x2ac80, 0x64) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000e040042c070bb3669f", @ANYRES16=r4, @ANYBLOB="010200000000000000001b00000008009a0002000000"], 0x1c}}, 0x0) r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000340)=0x1c) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r8 = socket(0x27, 0x3, 0x0) setsockopt$inet_int(r8, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r7, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local, r9}, 0xc) sendmmsg$sock(r6, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)="0a7530b7ffd4bd121401e0bd7159558210b53e8e584ce7e73f8bc19432337bfab285eefb9c0aa84a27930d47fb5caf1a750d70528562ceba0097d1ab39fa0aee74b49a046d55c1a06670", 0x4a}, {&(0x7f00000005c0)="aaa3f19a03144253d5acbb2fedf3da09035afc2928509bc1a320ac9ad56b1b43ff3ba27f5ae8d9861ba349", 0x2b}], 0x2, &(0x7f0000000640)=[@mark={{0x14, 0x1, 0x24, 0x1000}}], 0x18}}, {{&(0x7f0000000680)=@in={0x2, 0x4e22, @empty}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="7240d32f3b373b05469c955cd83aa8e919cf462496d187218f5c8b0edc49de22621f8f08688b0a95dc5df4ae8e22f194f115f57e83bf743fc02b105a3f8027f042f3f0fdb9641e094e1978df425be41335d9e72b3878ba4703fe3a1e08f3d86bc7128133e87da33d794d8611cf35c63fbd9bc1eb3ee40459b0b1bcf8b1baf3424e8fed14771f611117eaa4748253042d0fa681f54aca371a66c7ae21", 0x9c}, {&(0x7f00000017c0)="ddb6afc8d3e117840b54dc0054509e02727936299139", 0x16}, {&(0x7f0000001800)="e43256a09be4a409aa4c8311b380feb88e6c200af841387bd2463f4fc9e4c860dedd5aa1503efbf492812e654dab9dba5c7a2c399c84015612bce9d2f20a2c1ee243240b940367b8b8327023a28be4995549fb1bd612b3bdbac0620f6e9faa51bc4d0bbca86646786fd02b38d6fe7a1318c0b1a723a5b0872380613537fb6cd1ca89a58eaf7af64208084f00306a542b28e4dbb18912480e01c57968e6dd8eeff6c9a6e4cadd165f662df6fff76c3189e93ce3875ddd3e2d121d16b559bd5804589e08bbc3ca9be204dbd302cf21d065b03440929b77c9704452825825631668d4fd7264721c3e", 0xe7}, {&(0x7f0000001900)}], 0x5}}, {{&(0x7f00000019c0)=@caif=@dgm={0x25, 0x800000, 0x1}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000001a40)="078039d901fda80718496536e5c45011bee5763ffda213620f98adb1c758026dfbb1a26c6e5865c97fa17b791362a2184b93782000752cf85893963aa46a766fe7e14dd0d9a379c330e096438863c2107a1aeee2136f4e68be64a96ebb9fa38ffa2b51fd8ef2d9b6c12067d3aa51ae96a817599f9923e5a1be845efc46a00639b4074bdb53df4818d2822591b39157d9df2ac6ef0c0c088d3e48f32c8a8eb327e87304434dc85c0fae", 0xa9}, {&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="6cc18716edaa340c7a52120713e7c9fae49ea1490f7a97dfad8302a89f41ebf6ae7a92b34d73e1691cba443dd3dfec2f7e6b8a966095029ba9b91699b2f932a6402640f76ab41b3427e711dd59db7b18be37c533126eb59778cb7e98a7ff46149d1f794a56e60a8c865e934573b8faf235a619b655403a6d022d2520853cfd92a4ef155bf94cab329fa2198a16af4c73f2664ec347081e5e9c940aad331ae9938430", 0xa2}], 0x3}}, {{&(0x7f0000002c00)=@generic={0x28, "73ccc849d11b654d4d2a421f5f5ca1e1a463dd95854202803893aa0500db26cd76c74f207d6246182ca9fae519a177d99890f37b280e088f22f98b49bcb49b45e2afafe7c63b65b8c96c07dd1da5861502f841b84fff0ab15f344aa39ca251bf7c5406461895bc237f580428985caf6c5b294d42aea3eeb912a507421d21"}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002c80)="d1bb8b961ecaf0e2215f8cd3640e8f5e3fe3e7788489464c3294d9a3b1d1c3633eec953468c1000764199cf94b6c3cf98a32e2", 0x33}, {&(0x7f0000002cc0)="f2ac5a6c66cfdd2dc36df8836d9c16bc5e62a911c689e9355a293c22e56f73b25f00d3afb0bcdfd0df3b995e4754444ff8e1d9c82c71fb35bac26b1e72a5b2449a12a866d20eeb15b96a755abee3c6af560ccc84e16131531b9faa6bdfbc04d963c338d0a871809b07605a0b3a110d58e543b1184ea01681b297478a43bf250351d344542d9e83b2f1a75c598e7645ebc11efedc82728731f9eb2e8f8e8fcb90eec0425d1e73f07cd59f4763bb27c8ae47a3cb38090185260665", 0xba}, {&(0x7f0000002d80)="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", 0xff}], 0x3, &(0x7f0000002ec0)=[@timestamping={{0x14, 0x1, 0x25, 0xa3a}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x93}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff8}}], 0x90}}, {{&(0x7f0000002f80)=@l2={0x1f, 0x9, @none, 0x3, 0x1}, 0x80, &(0x7f0000003140)=[{&(0x7f0000003000)="c8ecda6b1aae0db537ba48ba82250237a1f613b7278d0c0a63a9cf3c1b360493c1dbbd5177fef9d4fcf62d7421568500da47daaac1b2a8f734a4bc7c3f3dcf4bc3809d948dfa337974b50cf70fbe730967e83866e3f0f28971d7abdca5733f0614367f44f5dca7d19f22daf68cbbd12834", 0x71}, {&(0x7f0000003080)="e9b28a745582742b3395e85c3f1a15a11ad0fe8dbac80a96c5aa835599644c123c9e9b0a2660c36f3bffcf63550a533a5c", 0x31}, {&(0x7f00000030c0)="d7bbcf97931b9a116ae673dc560f5101f3a3ae9d06f9b53fb80bdec811809c20b3b4765e9b7394459f0a64f34875572be4bdb126af5a1c65670459e20fdd0ded322e0d54862e2fae49cd63f8e2136af8efa6f58b5735a2d4069bb6433cdc76b6d4d02cc6ac7aa06d159325e36d9fd4141ac4a8", 0x73}], 0x3, &(0x7f0000003180)=[@mark={{0x14, 0x1, 0x24, 0x80}}, @txtime={{0x18, 0x1, 0x3d, 0xcf}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x3794}}], 0x90}}, {{&(0x7f0000003240)=@can, 0x80, &(0x7f0000003340)=[{&(0x7f00000032c0)="898b498c25ee2ba7a9997a0f7aee5a4184c25f5916c40659aa", 0x19}, {&(0x7f0000003300)="cf932dd8a64494944906a5cc4388ad12b19cb3f7a351d23cca5188ef4dea492d71380c3666fa045d", 0x28}], 0x2, &(0x7f0000003380)=[@txtime={{0x18, 0x1, 0x3d, 0x7e}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}], 0x60}}, {{&(0x7f0000003400)=@rc={0x1f, @any, 0x7}, 0x80, &(0x7f0000003940)=[{&(0x7f0000003480)="ac5eecd6efd6463d31703c97523867cfd20438fca5a969cff6bffecacb0225dc92f82b20c985d5075898d84cd0e153feb1779d7e52cf525c43c94a53620adf623f418c499e45c241f6c767643bacf0ea67332b75e2263bb6445430d021f95b93020cd6f9bab93a83b9e5eb4a3bfdb3dd60b500ab", 0x74}, {&(0x7f0000003500)="32f116ad3ff76d7472c8f57946c9c3ec57ea6ecf3fdc07506699773f00582dc699b86a348281be3ffdef6aef840663f6633b33a46362f153fc357c26fb38987986e622cf69037a461f5ed426eeb463960b9243daa1c271fccf68379d8e3e7efb94ef7348bc930967896a4183cfb7048e92573749562abb13b21ebcd871efadc932e28a1186c02ffd378934567be2f677262f5c3dbfc2a558372f7d8721bbdd0730efbbe4911ac7649a65bb617817ba4a839ff44db892d699ea87164ec584159711a5f4a2fead94518ffd80daf388a60aaf49ba3c220e32a1727dda52f62f122118", 0xe1}, {&(0x7f0000003600)="5a08e949f7e31d73e480c1ef4c36e074e3859757f606975175041eac82f81110cf07ec2362387c1a67b0816bf10fff03e06d04c1fba0f7a3c3142cbbce6a5567bee6d293a89c3c4c459c0e7002762e200853ae84eb7790d804172b4763030f47be270a39f569209ffa6c112e93a9536676cd8cfe4d6dd616736b801505d75abae52abef88dc91037a58ceb3c8393e82bfc77df06ab06265b0d5a0191b48183dff2efa4ca8da079fe5d334f07e0f7e8e4bc90c457cccab60dfcbf768bc12dd52981476fb70ad3e3742a", 0xc9}, {&(0x7f0000003700)="d28177aa317c63f4d5d271f1c7731c184e538169fbd53537e2b9", 0x1a}, {&(0x7f0000003740)="28d307309abbdc261f3fa947de652b5227b9f9bf1b69590784b9a64dd16ab142cc764f53898ee01b936fb91cfb1c1a198eea90e50c35ab40e6aa74eaef32b71afbd925051bd05ee0b15bead5d9d5fa6d3703ddafbb5a5366ea4c67003d2c414208d66eb296d1baa26bd7bcfadbc7b12f6cd8c4b456a6ff4201ae4187f74d8992bd52ae0148ef5a82bcdae899aa69ccc6834e4320aa56925ee442ffc643e61ddf3757d8ff73a69996ec7b24910509108fd25285f4edc76aadbab6ddf516f5aa61715165", 0xc3}, {&(0x7f0000003840)="e641e443a1000ac67436f5acd5ee02c652e736d6e3b5a0f1a5c26055821e040777ecf2433f", 0x25}, {&(0x7f0000003880)="71b3a86d230945ca343e3be4ec5f165640a9cb01ae6f869cd893b7e8e8569f91020d71f206eabbab429c561c76327b35e00e499edf291b58281caddcf1d6cb588b6d20d4a73e0e6d20fae2f7091fd75c9431d3d96d30da59ee3e178095fb013df73c3093ebcbf9becf0c7403eae855b4", 0x70}, {&(0x7f0000003900)="42b22769f77c62998cbfe4da8f2371552aefc0", 0x13}], 0x8, &(0x7f00000039c0)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffc1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x2eb}}], 0xa8}}, {{&(0x7f0000003a80)=@xdp={0x2c, 0x0, r9, 0x3}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000003b00)="6d4e471d700965aac4c12689ed23cd8f24f7f9e5b7986081f1c4435e87c36b671530e8774887390d2826518120b50b4e587b916b0fe2eadb722c7d42c58a6cb92dbac6ef15ee7e96c0ac6eafa7d341c8b2d4c1a3e6f839e5ca245078508318d076abe49df6c2247724ccd7b8a1c540c3ee61c92f75f54b17e9890a0b6bdcf4c303462e252ad0dce242", 0x89}, {&(0x7f0000003bc0)="09dec6be46f523f9c562db29e8d613782777287b2f084f6ebb3122a28571c14a1aedd91e96e5bf457d97e73d04174c6ee2963618c1215fa900b95e2d88c466e6ec821403db7fdcf2993ea7873fc20029db7e9cca704a418375373a4bd2e9caea5b045f9e3b650ffe2dea0e3b7cd1c97be38012e5748eb7501a2c5b3a77daf45935813bcf3384d18b79128efa83bf85f15fbd6457c80ccba9a8f14a", 0x9b}, {&(0x7f0000003c80)="e44f8db1e9a477c7bb2235f94422c648b55060df2d02289860ffc08376a1a462d02fa90b680c64321adf002c447b04c976bd52cde311c4af59df6bda7142ad0cc1d33a21b609bf22b259b829b834b144e29cd9f8ef5ac560fc7fc8c44912c52df120a4a9ec07da5e6f5aa3a39f05824966343a97f0e960a88d4111a6484c829ca9cc051aede29fda30dd8e86c7eb412c7885aa870403177f0684af35ff1a20511133d5b3dc73221d520f72f0d98d93b67d27766c5965ef377ab0e9da202c0d59409c8c06c6a1a41a0f4404", 0xcb}], 0x3, &(0x7f0000003dc0)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffff9}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x7f24}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0xd82}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}], 0xa8}}, {{&(0x7f0000003e80)=@sco={0x1f, @fixed={[], 0x11}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003f00)="2efdb39abfd121ab16c4dcce392354483147fdc3826358a15b381caa016c382b0a071a94d55bac508ae965d7093d2a5263e1205c0809bd951078cc5c6307f16a4896a689cb3aa79afae0f137e05a02c60252e44747d557cb0b61b3a0bc3f426fb6aa1062", 0x64}], 0x1, &(0x7f0000003fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffb}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0xd8}}, {{&(0x7f00000040c0)=@l2={0x1f, 0x1a8, @any, 0x4, 0x2}, 0x80, &(0x7f0000004180)=[{&(0x7f0000004140)="2a9f5a13304013c504090320d26814b481f5a9f489cb752755904065042b8490a0e8bb48ef44d0911ac1d31fd0e1255129c6435c56ad8bf62e1c57d3", 0x3c}], 0x1, &(0x7f00000041c0)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffff7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x7ad7f9f7}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0xc0}}], 0xa, 0x4008890) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0xff}}, [0x7, 0xfffffffffffffff8, 0x2, 0x5, 0xffffffffffff8001, 0x142, 0x6, 0x3, 0x6, 0xfffffffffffffff9, 0x4, 0xd2a, 0x4, 0xb5, 0xfffffffffffffff7]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000004c0)={r10, 0x800}, &(0x7f0000000500)=0x8) epoll_create1(0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x1) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000034c00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3266.906467] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000003dee58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3267.001201] audit: type=1800 audit(1583640082.120:907): pid=10886 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16770 res=0 [ 3267.046785] device bond1449 entered promiscuous mode [ 3267.052705] FAULT_INJECTION: forcing a failure. [ 3267.052705] name failslab, interval 1, probability 0, space 0, times 0 04:01:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x800000000000000}) [ 3267.083768] audit: type=1800 audit(1583640082.140:908): pid=11001 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16770 res=0 [ 3267.126615] CPU: 0 PID: 11007 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3267.134518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3267.143878] Call Trace: [ 3267.146478] dump_stack+0x188/0x20d [ 3267.150115] should_fail.cold+0xa/0x1b [ 3267.154035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3267.159169] __should_failslab+0x115/0x180 [ 3267.163439] should_failslab+0x5/0xf [ 3267.167170] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 3267.171847] ? __might_fault+0x192/0x1d0 [ 3267.175908] ? _copy_from_user+0xd2/0x140 [ 3267.180071] copy_mount_options+0x59/0x390 [ 3267.184325] ksys_mount+0xa3/0x150 [ 3267.187880] __x64_sys_mount+0xba/0x150 [ 3267.191867] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3267.196462] do_syscall_64+0xf9/0x620 [ 3267.200284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3267.205480] RIP: 0033:0x45eefa [ 3267.208680] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 3267.227584] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3267.235303] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045eefa [ 3267.240258] bond1449: making interface bridge2596 the new active one [ 3267.242574] RDX: 00007f8b1145fae0 RSI: 0000000020000040 RDI: 00007f8b1145fb00 [ 3267.242583] RBP: 000000000076bfc0 R08: 00007f8b1145fb40 R09: 00007f8b1145fae0 [ 3267.242591] R10: 00000000029400a0 R11: 0000000000000206 R12: 0000000000000006 [ 3267.242600] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001c [ 3267.251166] audit: type=1400 audit(1583640082.360:909): avc: denied { getopt } for pid=10938 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:01:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3267.321313] device bridge2596 entered promiscuous mode [ 3267.329896] bond1449: Enslaving bridge2596 as an active interface with an up link 04:01:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000fffffff058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3267.474517] audit: type=1800 audit(1583640082.580:910): pid=11018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16770 res=0 04:01:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036800000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x900000000000000}) 04:01:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036c00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:22 executing program 1 (fault-call:6 fault-nth:29): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000fffffffe58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3267.827263] bond1449: Enslaving bridge2597 as an active interface with a down link 04:01:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19cc, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3267.918929] FAULT_INJECTION: forcing a failure. [ 3267.918929] name failslab, interval 1, probability 0, space 0, times 0 [ 3267.930151] CPU: 1 PID: 11252 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3267.938050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3267.947409] Call Trace: [ 3267.950011] dump_stack+0x188/0x20d [ 3267.953659] should_fail.cold+0xa/0x1b [ 3267.957557] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3267.962667] ? find_held_lock+0x2d/0x110 [ 3267.966736] __should_failslab+0x115/0x180 [ 3267.970976] should_failslab+0x5/0xf [ 3267.974696] kmem_cache_alloc+0x44/0x710 [ 3267.978769] ? check_preemption_disabled+0x41/0x280 [ 3267.982445] device bond1450 entered promiscuous mode [ 3267.983789] __sigqueue_alloc+0x25c/0x4d0 [ 3267.983805] __send_signal+0x21e/0x14c0 [ 3267.983824] force_sig_info+0x248/0x300 [ 3268.000973] force_sig_info_fault.constprop.0+0x1dc/0x310 [ 3268.006512] ? is_prefetch.isra.0+0x420/0x420 [ 3268.011018] ? lock_downgrade+0x740/0x740 [ 3268.015176] ? __lock_is_held+0xad/0x140 [ 3268.019250] __bad_area_nosemaphore+0x2e6/0x400 [ 3268.023931] ? up_read+0x17/0x110 [ 3268.027391] __do_page_fault+0xa64/0xdd0 [ 3268.031460] ? trace_hardirqs_off_caller+0x55/0x210 [ 3268.036476] ? vmalloc_fault+0x730/0x730 [ 3268.040540] ? page_fault+0x8/0x30 [ 3268.042769] bond1450: making interface bridge2598 the new active one [ 3268.044083] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3268.044102] ? page_fault+0x8/0x30 [ 3268.044115] page_fault+0x1e/0x30 [ 3268.044130] RIP: 0033:0x4560af [ 3268.063623] device bridge2598 entered promiscuous mode [ 3268.065600] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 3268.065609] RSP: 002b:00007f8b11480a68 EFLAGS: 00010283 [ 3268.065621] RAX: 00007f8b11480b40 RBX: 00007f8b114816d4 RCX: 0000000000000000 [ 3268.065628] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f8b11480b40 [ 3268.065639] RBP: 000000000076bf20 R08: 00000000000000e0 R09: 000000000076bf20 [ 3268.085464] bond1450: Enslaving bridge2598 as an active interface with an up link [ 3268.089879] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 3268.089887] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001d [ 3268.140101] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3268.157433] EXT4-fs (sda1): Remounting filesystem read-only 04:01:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xa00000000000000}) 04:01:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037400000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3268.212850] bond1450: Enslaving bridge2599 as an active interface with a down link 04:01:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000ffff58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19cd, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:23 executing program 1 (fault-call:6 fault-nth:30): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:23 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$int_out(r0, 0x0, &(0x7f00000001c0)) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=ANY=[@ANYBLOB="18006ea63a79f0109f8a5510d35724f7840000e3"], 0x18}}], 0x1, 0x48010) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x3, 0x214000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="0bbfb900", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7c, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={r8, 0xadf, 0x3}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r9, @ANYBLOB="190000005f9f8d25bb14998518f63cc9b0e10e882dbfc94a9633bbd3b9"], &(0x7f0000000180)=0x21) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037a00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3268.422190] audit: type=1800 audit(1583640083.540:911): pid=11369 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17025 res=0 [ 3268.458633] FAULT_INJECTION: forcing a failure. [ 3268.458633] name failslab, interval 1, probability 0, space 0, times 0 [ 3268.490303] CPU: 0 PID: 11385 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3268.498214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3268.507568] Call Trace: [ 3268.510170] dump_stack+0x188/0x20d [ 3268.513816] should_fail.cold+0xa/0x1b [ 3268.517717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3268.522835] __should_failslab+0x115/0x180 [ 3268.527075] should_failslab+0x5/0xf [ 3268.530786] __kmalloc_track_caller+0x2cb/0x770 [ 3268.535458] ? strndup_user+0x70/0xe0 [ 3268.539261] ? __might_fault+0x192/0x1d0 [ 3268.543343] ? _copy_from_user+0xd2/0x140 [ 3268.547511] memdup_user+0x22/0xb0 [ 3268.551055] strndup_user+0x70/0xe0 [ 3268.554800] ksys_mount+0x77/0x150 [ 3268.558345] __x64_sys_mount+0xba/0x150 [ 3268.562330] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3268.566926] do_syscall_64+0xf9/0x620 [ 3268.570749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3268.575971] RIP: 0033:0x45eefa [ 3268.579168] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 3268.598285] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3268.606009] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045eefa [ 3268.613284] RDX: 00007f8b1145fae0 RSI: 0000000020000040 RDI: 00007f8b1145fb00 [ 3268.620583] RBP: 000000000076bfc0 R08: 00007f8b1145fb40 R09: 00007f8b1145fae0 [ 3268.627861] R10: 00000000029400a0 R11: 0000000000000206 R12: 0000000000000006 04:01:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xb00000000000000}) [ 3268.635139] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001e [ 3268.648664] f2fs_msg: 126 callbacks suppressed [ 3268.648675] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3268.662360] device bond1451 entered promiscuous mode [ 3268.685107] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3268.708530] F2FS-fs (loop2): Invalid log sectors per block(31235) log sectorsize(9) [ 3268.731531] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3268.751405] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3268.769796] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3268.795878] F2FS-fs (loop2): Invalid log sectors per block(31235) log sectorsize(9) [ 3268.825362] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:01:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xc00000000000000}) 04:01:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000038200000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000f0ffff58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3269.043447] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3269.060524] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:01:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000038a00000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xd00000000000000}) 04:01:24 executing program 1 (fault-call:6 fault-nth:31): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3269.208573] bond1451: making interface bridge2600 the new active one [ 3269.218024] device bridge2600 entered promiscuous mode [ 3269.229371] bond1451: Enslaving bridge2600 as an active interface with an up link 04:01:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030003000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3269.371869] validate_nla: 4 callbacks suppressed [ 3269.371878] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3269.419312] FAULT_INJECTION: forcing a failure. [ 3269.419312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3269.431154] CPU: 0 PID: 11640 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3269.434112] bond1451: Enslaving bridge2601 as an active interface with a down link [ 3269.439033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3269.439040] Call Trace: [ 3269.439062] dump_stack+0x188/0x20d [ 3269.439083] should_fail.cold+0xa/0x1b [ 3269.466201] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3269.471304] ? mark_held_locks+0xf0/0xf0 [ 3269.475363] __alloc_pages_nodemask+0x1c7/0x6a0 [ 3269.480025] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 3269.485034] ? fs_reclaim_acquire+0x10/0x10 [ 3269.489341] ? should_fail+0x142/0x7bc [ 3269.493218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3269.498331] cache_grow_begin+0x8e/0x8a0 [ 3269.502380] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3269.507124] kmem_cache_alloc+0x648/0x710 [ 3269.511267] getname_flags+0xd2/0x5b0 [ 3269.515057] user_path_at_empty+0x2a/0x50 [ 3269.519207] do_mount+0x13d/0x2a40 [ 3269.522742] ? rcu_read_lock_sched_held+0x10a/0x130 [ 3269.527744] ? copy_mount_string+0x40/0x40 [ 3269.531970] ? __might_fault+0x192/0x1d0 [ 3269.536018] ? _copy_from_user+0xd2/0x140 [ 3269.540157] ? copy_mount_options+0x27a/0x390 [ 3269.544641] ksys_mount+0xd7/0x150 [ 3269.548174] __x64_sys_mount+0xba/0x150 [ 3269.552138] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3269.556720] do_syscall_64+0xf9/0x620 [ 3269.560511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3269.565684] RIP: 0033:0x45eefa [ 3269.568858] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 3269.587737] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3269.595441] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045eefa [ 3269.602708] RDX: 00007f8b1145fae0 RSI: 0000000020000040 RDI: 00007f8b1145fb00 [ 3269.609982] RBP: 000000000076bfc0 R08: 00007f8b1145fb40 R09: 00007f8b1145fae0 04:01:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19ce, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000009effffff58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3269.617234] R10: 00000000029400a0 R11: 0000000000000206 R12: 0000000000000006 [ 3269.624488] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 000000000000001f [ 3269.674291] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xe00000000000000}) 04:01:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000032804000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:25 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x193) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) lseek(r3, 0x10001, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) [ 3269.830447] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3269.859787] EXT4-fs (sda1): Remounting filesystem read-only [ 3269.903516] device bond1452 entered promiscuous mode 04:01:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000f0ffffff58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xf00000000000000}) 04:01:25 executing program 1 (fault-call:6 fault-nth:32): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) [ 3270.011915] bond1452: making interface bridge2602 the new active one [ 3270.024221] device bridge2602 entered promiscuous mode [ 3270.031158] bond1452: Enslaving bridge2602 as an active interface with an up link 04:01:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035404000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3270.137420] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035504000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19cf, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3270.262874] kauditd_printk_skb: 3 callbacks suppressed [ 3270.262887] audit: type=1800 audit(1583640085.370:915): pid=11769 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17208 res=0 04:01:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1000000000000000}) 04:01:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000feffffff58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:25 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000140)=""/168, &(0x7f0000000000)=0xa8) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3270.427636] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3270.471270] FAULT_INJECTION: forcing a failure. [ 3270.471270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3270.483239] CPU: 0 PID: 11774 Comm: syz-executor.1 Not tainted 4.19.108-syzkaller #0 [ 3270.491132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3270.500491] Call Trace: [ 3270.503097] dump_stack+0x188/0x20d [ 3270.506747] should_fail.cold+0xa/0x1b [ 3270.510659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3270.515784] ? mark_held_locks+0xf0/0xf0 [ 3270.519867] __alloc_pages_nodemask+0x1c7/0x6a0 [ 3270.524555] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 3270.529588] ? fs_reclaim_acquire+0x10/0x10 [ 3270.533924] ? should_fail+0x142/0x7bc [ 3270.537824] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3270.542939] cache_grow_begin+0x8e/0x8a0 [ 3270.547017] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3270.551787] kmem_cache_alloc_trace+0x6b5/0x7a0 [ 3270.556471] ? __might_fault+0x192/0x1d0 [ 3270.560545] ? _copy_from_user+0xd2/0x140 [ 3270.564709] copy_mount_options+0x59/0x390 [ 3270.568962] ksys_mount+0xa3/0x150 [ 3270.572515] __x64_sys_mount+0xba/0x150 [ 3270.576504] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3270.581112] do_syscall_64+0xf9/0x620 [ 3270.584926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3270.590119] RIP: 0033:0x45eefa [ 3270.593322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 3270.612233] RSP: 002b:00007f8b1145fa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:01:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1001000000000000}) 04:01:25 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035604000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3270.619949] RAX: ffffffffffffffda RBX: 00007f8b114606d4 RCX: 000000000045eefa [ 3270.627224] RDX: 00007f8b1145fae0 RSI: 0000000020000040 RDI: 00007f8b1145fb00 [ 3270.634496] RBP: 000000000076bfc0 R08: 00007f8b1145fb40 R09: 00007f8b1145fae0 [ 3270.641770] R10: 00000000029400a0 R11: 0000000000000206 R12: 0000000000000006 [ 3270.649047] R13: 0000000000000bd9 R14: 00000000004cdbcc R15: 0000000000000020 [ 3270.759109] device bond1453 entered promiscuous mode 04:01:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000007ffff000000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:25 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035704000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3270.858097] bond1453: making interface bridge2604 the new active one [ 3270.872765] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3270.885040] EXT4-fs (sda1): Remounting filesystem read-only [ 3271.003234] device bridge2604 entered promiscuous mode 04:01:26 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29400a0, 0x0) 04:01:26 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1100000000000000}) [ 3271.027593] bond1453: Enslaving bridge2604 as an active interface with an up link [ 3271.144699] bond1453: Enslaving bridge2605 as an active interface with a down link [ 3271.166886] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035804000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000000000f000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:26 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {0x3, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x4]}]}, 0x28}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r4, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1101000000000000}) 04:01:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035904000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3271.340345] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3271.348720] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3271.356213] EXT4-fs (sda1): Remounting filesystem read-only 04:01:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000048000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3271.502739] device bond1454 entered promiscuous mode [ 3271.527420] audit: type=1800 audit(1583640086.640:916): pid=12164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16546 res=0 04:01:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1200000000000000}) 04:01:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035a04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3271.598653] bond1454: making interface bridge2606 the new active one [ 3271.640678] device bridge2606 entered promiscuous mode [ 3271.647472] bond1454: Enslaving bridge2606 as an active interface with an up link [ 3271.678513] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:26 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x29400a0, 0x0) 04:01:26 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035b04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:26 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000080)='./file0\x00', 0x80082, 0x80) openat(0xffffffffffffffff, 0x0, 0x82d00, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}]}, 0x1c}}, 0x4000000) epoll_create1(0x0) epoll_create1(0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x10, 0x1, 0x9}) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3271.796783] audit: type=1800 audit(1583640086.910:917): pid=12282 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17221 res=0 [ 3271.807723] bond1454: Enslaving bridge2607 as an active interface with a down link 04:01:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000002000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1300000000000000}) 04:01:27 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035c04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3271.892334] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3271.928524] EXT4-fs (sda1): Remounting filesystem read-only 04:01:27 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000140)=0x4) r4 = dup(r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4e52e4a120b8619223c7", @ANYRES16=r5, @ANYBLOB="010200000000000000001300000008009a0002000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3272.022176] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3272.045381] EXT4-fs (sda1): Remounting filesystem read-only [ 3272.088879] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3272.103398] audit: type=1800 audit(1583640087.220:918): pid=12410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 04:01:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1400000000000000}) [ 3272.196666] audit: type=1800 audit(1583640087.250:919): pid=12417 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 [ 3272.314674] device bond1455 entered promiscuous mode 04:01:27 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x20003, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7c, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000140)={r7, @in={{0x2, 0x4e21, @remote}}, 0xf330, 0x1ff, 0x7, 0x5, 0x6}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000280)={r8, 0xe09b, 0x84, "887dc1b53051015f2df267896a0c43eae42934197371488f643a22aa17078a153c99cec1e66413be2d42298e0ed06edd4cdbfc3d6aa8c515768ca698421bf7e451e452638522a79ec238f2aa7cb2620025f9400e34367a66b67aa46897455d347645b2ebb9b0f97853386a2f7663e74bf0a3711bdc38e4c716e1ac2ad3e6c319f6e2f7a7"}, 0x8c) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x22) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3272.447851] bond1455: making interface bridge2608 the new active one [ 3272.474042] audit: type=1800 audit(1583640087.590:920): pid=12433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 [ 3272.500510] device bridge2608 entered promiscuous mode [ 3272.519658] bond1455: Enslaving bridge2608 as an active interface with an up link 04:01:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1500000000000000}) [ 3272.538847] audit: type=1800 audit(1583640087.620:921): pid=12435 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 [ 3272.575201] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:27 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x29400a0, 0x0) 04:01:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000003000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3272.694381] bond1455: Enslaving bridge2609 as an active interface with a down link [ 3272.769489] audit: type=1800 audit(1583640087.880:922): pid=12472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16641 res=0 04:01:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d2, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3272.812245] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1600000000000000}) [ 3272.877559] EXT4-fs (sda1): Remounting filesystem read-only 04:01:28 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) dup(r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) epoll_create1(0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f00000000c0)={0x1000, 0x6, 0xffff, 0xfff, 0x7}) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x37]}}]}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r5, 0x7e64) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r9, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) read(r9, &(0x7f0000000180)=""/19, 0xfffffe47) epoll_create1(0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3272.929659] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000004000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3273.071155] device bond1456 entered promiscuous mode 04:01:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1700000000000000}) [ 3273.159380] bond1456: making interface bridge2610 the new active one [ 3273.180344] device bridge2610 entered promiscuous mode [ 3273.188854] bond1456: Enslaving bridge2610 as an active interface with an up link [ 3273.217358] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3273.247140] EXT4-fs (sda1): Remounting filesystem read-only [ 3273.457577] bond1456: Enslaving bridge2611 as an active interface with a down link [ 3274.110851] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3274.117957] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3274.155206] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3274.185661] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3274.212894] device bridge_slave_1 left promiscuous mode [ 3274.228615] bridge0: port 2(bridge_slave_1) entered disabled state [ 3274.293203] device bridge_slave_0 left promiscuous mode [ 3274.298739] bridge0: port 1(bridge_slave_0) entered disabled state [ 3274.378282] device veth1_macvtap left promiscuous mode [ 3274.392947] device veth0_macvtap left promiscuous mode [ 3274.408449] device veth1_vlan left promiscuous mode [ 3274.422588] device veth0_vlan left promiscuous mode [ 3274.673219] bond2 (unregistering): Released all slaves [ 3274.689076] bond1 (unregistering): Released all slaves [ 3274.874143] device hsr_slave_1 left promiscuous mode [ 3274.917127] device hsr_slave_0 left promiscuous mode [ 3274.989521] team0 (unregistering): Port device team_slave_1 removed [ 3275.011893] team0 (unregistering): Port device team_slave_0 removed [ 3275.028430] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3275.087494] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3275.206078] bond0 (unregistering): Released all slaves [ 3275.766535] IPVS: ftp: loaded support on port[0] = 21 [ 3275.942310] chnl_net:caif_netlink_parms(): no params data found [ 3276.116402] bridge0: port 1(bridge_slave_0) entered blocking state [ 3276.131005] bridge0: port 1(bridge_slave_0) entered disabled state [ 3276.138967] device bridge_slave_0 entered promiscuous mode [ 3276.182824] bridge0: port 2(bridge_slave_1) entered blocking state [ 3276.189230] bridge0: port 2(bridge_slave_1) entered disabled state [ 3276.197446] device bridge_slave_1 entered promiscuous mode [ 3276.253076] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3276.274601] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3276.308308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3276.317018] team0: Port device team_slave_0 added [ 3276.331960] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3276.352819] team0: Port device team_slave_1 added [ 3276.406315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3276.430279] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3276.505387] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3276.526331] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3276.545520] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3276.600242] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3276.622033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3276.629981] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3276.754396] device hsr_slave_0 entered promiscuous mode [ 3276.790910] device hsr_slave_1 entered promiscuous mode [ 3276.833955] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3276.846686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3277.076166] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3277.195633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3277.207543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3277.224675] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3277.241091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3277.248293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3277.265299] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3277.276481] 8021q: adding VLAN 0 to HW filter on device team0 [ 3277.288460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3277.302291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3277.318025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3277.326895] bridge0: port 1(bridge_slave_0) entered blocking state [ 3277.333310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3277.350652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3277.365978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3277.373960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3277.387426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3277.396282] bridge0: port 2(bridge_slave_1) entered blocking state [ 3277.402690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3277.418262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3277.425993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3277.443573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3277.456251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3277.469257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3277.484688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3277.495669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3277.508901] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3277.526183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3277.535098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3277.544651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3277.556283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3277.565251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3277.575126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3277.591183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3277.600950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3277.608851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3277.618084] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3277.625009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3277.646718] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3277.656120] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3277.665885] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3277.673168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3277.687587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3277.709570] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3277.722149] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3277.729509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3277.738703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3277.825875] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3277.839511] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3277.849762] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3277.874330] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3277.883777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3277.897329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3277.911357] device veth0_vlan entered promiscuous mode [ 3277.926504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3277.935216] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3277.953361] device veth1_vlan entered promiscuous mode [ 3277.959631] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3277.978268] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3278.008312] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3278.027047] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3278.037519] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3278.049117] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3278.059231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3278.074256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3278.089952] device veth0_macvtap entered promiscuous mode [ 3278.096758] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3278.109487] device veth1_macvtap entered promiscuous mode [ 3278.116378] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3278.127419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3278.139900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3278.150847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3278.160805] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.170110] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3278.180394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.189786] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3278.199971] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.209488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3278.220341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.229507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3278.239560] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.251198] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3278.258466] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3278.265808] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3278.274340] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3278.289970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3278.298424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3278.315096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3278.325756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.335234] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3278.346390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.356035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3278.366082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.375486] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3278.385754] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.395227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3278.405262] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3278.416512] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3278.424183] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3278.431866] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3278.439922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3278.728428] f2fs_msg: 94 callbacks suppressed [ 3278.728441] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3278.747168] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3278.759237] F2FS-fs (loop2): Invalid log sectors per block(285699) log sectorsize(9) [ 3278.772448] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3278.780099] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3278.789971] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3278.803347] F2FS-fs (loop2): Invalid log sectors per block(285699) log sectorsize(9) [ 3278.813311] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:01:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035d04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1800000000000000}) 04:01:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000a000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:34 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x29400a0, 0x0) 04:01:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d3, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:34 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r4, &(0x7f00000017c0), 0x1b4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0xfff, 0x208, 0x3f, 0x400, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x80, 0x7f, 0xc, 0x20, 0x6, 0x400, 0xff, 0x10000, r5}, &(0x7f0000000180)=0x20) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3278.934282] validate_nla: 1 callbacks suppressed [ 3278.934292] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3279.045839] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3279.046461] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3279.073637] audit: type=1800 audit(1583640094.190:923): pid=12851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17244 res=0 [ 3279.085894] EXT4-fs (sda1): Remounting filesystem read-only [ 3279.102873] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3279.124177] device bond1457 entered promiscuous mode 04:01:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000e000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:34 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x110) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="0cdac736e11590a60e397ebde8716389603e21ba7533c56223cf5234d96d98ed756274469ffeda588dfa8c014091bbef446c0a408b13b5502ab2366d308014914c5496d40346299b702d", 0x4a, 0x2c}], 0x0, &(0x7f0000000280)={[{@show_sys_files_yes='show_sys_files=yes'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise='appraise'}, {@measure='measure'}, {@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'nl80211\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x36, 0x32, 0x31, 0x64, 0x66, 0x35, 0x39], 0x2d, [0x56, 0x33, 0x66, 0x64], 0x2d, [0x34, 0x0, 0x30, 0x65], 0x2d, [0x31, 0x63, 0x31, 0x65], 0x2d, [0x66, 0x30, 0x66, 0x34, 0x32, 0x34, 0x32, 0x31]}}}, {@appraise='appraise'}, {@fsname={'fsname'}}]}) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000000000)={0xfffffff7, "0fc1dd54ef6837f53cbc358bd0eaded0379213cdc9b8521518e7fa6a38e89e6d", 0x1, 0x1}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000580)={&(0x7f0000000380)="6657f81e909998250fe9c785d90fc32cbade670656d74a63c4cf421d7b02ebc920a27a44b9b4c89b58690d1c287a0005bdbafff061e07417191b9242e18fc774564d1ff573ee8af2269f5bfc90641200123fa3016dc6efac8b81f76d82eec90b6fb1d3ea7d0b412f13123207797b", &(0x7f0000000400)=""/230, &(0x7f0000000500)="aa3a16ba852aa6e18462765d944fc906c42db7d7", &(0x7f0000000540)="103f3dbca7f8edd2b05959ab2a7988", 0x40, r0, 0x4}, 0x38) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3279.149048] audit: type=1800 audit(1583640094.220:924): pid=12926 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=17244 res=0 04:01:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1900000000000000}) 04:01:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035e04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3279.233493] bond1457: making interface bridge2612 the new active one [ 3279.250407] device bridge2612 entered promiscuous mode [ 3279.273766] bond1457: Enslaving bridge2612 as an active interface with an up link [ 3279.330518] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3279.348024] ntfs: (device loop4): parse_options(): Unrecognized mount option func. [ 3279.360547] EXT4-fs (sda1): Remounting filesystem read-only [ 3279.382477] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise. [ 3279.382740] bond1457: Enslaving bridge2613 as an active interface with a down link [ 3279.405395] ntfs: (device loop4): parse_options(): Unrecognized mount option measure. [ 3279.420192] ntfs: (device loop4): parse_options(): Unrecognized mount option hash. [ 3279.420843] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d4, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:34 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x29400a0, 0x0) 04:01:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000035f04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1a00000000000000}) [ 3279.510388] ntfs: (device loop4): parse_options(): Unrecognized mount option subj_user. [ 3279.567523] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3279.675737] ntfs: (device loop4): parse_options(): Unrecognized mount option func. [ 3279.719504] device bond1458 entered promiscuous mode 04:01:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000060000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3279.748571] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise. [ 3279.748649] bond1458: making interface bridge2614 the new active one [ 3279.768868] device bridge2614 entered promiscuous mode [ 3279.775567] bond1458: Enslaving bridge2614 as an active interface with an up link [ 3279.788800] ntfs: (device loop4): parse_options(): Unrecognized mount option measure. 04:01:34 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036904000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3279.816698] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3279.824353] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3279.844907] EXT4-fs (sda1): Remounting filesystem read-only 04:01:35 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) dup(r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, r2, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) epoll_create1(0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f00000000c0)={0x1000, 0x6, 0xffff, 0xfff, 0x7}) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@size={'size', 0x3d, [0x37]}}]}) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r5, 0x7e64) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r9, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) read(r9, &(0x7f0000000180)=""/19, 0xfffffe47) epoll_create1(0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1b00000000000000}) 04:01:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d5, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3279.941163] bond1458: Enslaving bridge2615 as an active interface with a down link 04:01:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000e0000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3280.060810] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3280.077966] EXT4-fs (sda1): Remounting filesystem read-only 04:01:35 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036a04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3280.101551] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1c00000000000000}) [ 3280.242513] device bond1459 entered promiscuous mode 04:01:35 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x29400a0, 0x0) 04:01:35 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036b04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000f0000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3280.439255] bond1459: making interface bridge2616 the new active one [ 3280.465689] device bridge2616 entered promiscuous mode 04:01:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1d00000000000000}) [ 3280.487008] bond1459: Enslaving bridge2616 as an active interface with an up link [ 3280.531579] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3280.547379] EXT4-fs (sda1): Remounting filesystem read-only 04:01:35 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000140)=0x4) r4 = dup(r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4e52e4a120b8619223c7", @ANYRES16=r5, @ANYBLOB="010200000000000000001300000008009a0002000000"], 0x1c}}, 0x0) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:35 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036c04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3280.605947] bond1459: Enslaving bridge2617 as an active interface with a down link [ 3280.624541] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d6, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000040010058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3280.675174] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3280.712619] EXT4-fs (sda1): Remounting filesystem read-only 04:01:35 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036d04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1e00000000000000}) [ 3280.798406] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:35 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x29400a0, 0x0) 04:01:36 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x2, &(0x7f00000004c0)=[{0x7f, 0x5, 0x7, 0x1}, {0xffff, 0x7, 0x3f, 0xff}]}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x48010) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000440)={0x9, [0x9, 0x6, 0x6a6d, 0x8, 0x8, 0x3ff, 0xffff, 0x1, 0x8001]}, &(0x7f0000000480)=0x16) open(&(0x7f0000000140)='./file0\x00', 0xd69040, 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000400)={0x9c0000, 0x2, 0x9, r0, 0x0, &(0x7f00000003c0)={0x9f0901, 0x1, [], @p_u8=&(0x7f0000000380)=0x9}}) sendmsg$nl_netfilter(r8, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000001d00)={0x15d4, 0x13, 0xa, 0x0, 0x70bd29, 0x25dfdbfe, {0x2, 0x0, 0xa}, [@nested={0x1135, 0x8d, 0x0, 0x1, [@generic="6d5bb1551ea269da80fb127a1d8d2acb06b58862af8cd12e75cd03f129b9f04ddd3f6a5d8b40534239b4cd68ac4a0a72f025c6ea3cb6ac8f78ed6849e439679f6f7675be3fd27667d1415d8384499f8386f339ffccd60e123fbded246482e564949f7943ac5a4998fe5e5d2b8640fbccdc732c4124eb478ee478a8e165172efd486dbb93d1c3169a23851ec8c08f16195519d40161d24d3fbd6f7014048d244961eb73c60b065e9986b821ebd605d19102", @typed={0x10, 0x1, 0x0, 0x0, @str='securityem1\x00'}, @generic="8c958efa0673d6eac9405cf22dce3670ed1f3baf587137ee9eac1e7a02d21bdc7247ba12ab5199f99e3ab35240646319d13afc760222feede3a4bf98856ba1e1f0cfa3c7299ac7e248ec85830d60294895726fdb945e97a154be6dac", @generic="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", @typed={0xa, 0x5b, 0x0, 0x0, @str='vlan0\x00'}, @typed={0x8, 0x2f, 0x0, 0x0, @pid=r5}]}, @nested={0x144, 0x33, 0x0, 0x1, [@typed={0xb0, 0x2f, 0x0, 0x0, @binary="45d83325ad39e05e59ed39b8c6ee6bf91f0f5d0ca23d5bde1c1d66793a4c27d01ad1be7d3b2e67595265134aa3669cbb95c4fa9873091eec2eb729f8383200e3f2697ebdf2e918e209b30a9be324b43011b238a5228b7428c4dbafc6c09abe46717dc85a8d5fb78e4c84ca16771d1fca5f4cef4f2160709cbfdd33c3057b91d64576c74c2c207a4de43b2851e6618baeb27863517d14b341f85761e2a755eeee14b9605a363766da0f146033"}, @generic="12c557a20bfe69f623899da0322828944f7ff782e330b0c34d3639da2ee7bcf1cf19c35af91357de0168a0ddca670dffd50f28c67a17dc7bb9aebc03413f98ee02c1fcc5179a95e80cd52e0a319e80bf5a1aff2143627948e01f579dd17a205ed068c2bd0c525aabf6d8b1770017b043fbb720d3e8bd60befa26909650a05ed2bbe9520cb24ff75be1e4937296b4179e"]}, @typed={0x8, 0x19, 0x0, 0x0, @uid=r6}, @generic="5337c1c58150f9ea53e3c7de13f80af6deeaa7b3d7b2", @generic="1dc459228328584ff864f6dfc90dfdb253ee8aeb6623f298fa7bfd91a210d494b5bf68d33e2a060e51af754d8b3d633054e75d58188bf1912c7c034f2e34c18399837c25d6da287fc88bd8818dde58a6378b00894c95a721a320ec8609250d6d26bf0768222f6a7940", @generic="d47228c847b0552f6a4f", @typed={0x101, 0x6b, 0x0, 0x0, @binary="4887589d5231aae3f31e1234f72e6b48b3c8164f94a17941213e1ff9bbb927114ac90736aca73a6d8930b240c8201a485dfb0cd4f7b228ca361c1186cfc28b25d55ecb448e15284bf2de53f1b47d78319803fccad439bf82f3e7d7a67e924d7cb90a0cce86f01e3e2253bddda013caa16a2da9f4b7b55bcb7e1c03906090fe629a519d7d78666f9a3723f5c91853429c401f00351f2d82758604c99f634818d1d427deceb1e09cedabb7c08fa51adf612dfc95a9ec6ba7ecb7bc5d8a6c96b516796932f10058b13a325426158892145c4733692d556aa0c8d6924a58ffb6f92cbfb4f9df764e18e8c5fede6d3f3d7ea42d21cfb6fd2c2cbb392ec7e90e"}, @typed={0x8, 0x17, 0x0, 0x0, @u32=0x8}, @nested={0x1a2, 0x6d, 0x0, 0x1, [@generic="ae25f94ed177461cbe39d93141ab6949d26e79b33c0b41fb8c556ce6826855452181598b7b145bb4d90d3d978ff331", @generic="95f789063db1d984f34b18698b8bcc55b3b0428fcb2eec099f0243f12173a732c07db391de3253eceede8df0b943b18e4563d0d6f3c5d8a0cc692c5be32e60ff478164e720fb1097a408fcbf3b96f5b1b36b5ff5eb377be11ab39f18299da274f1b6e4d574fd40d34f5908691c5e5aa198061a4e1979bc6e0902bfdfae7c3dad8456ea99dd589b2afbf6379ce1e52bd998a6fc3221a155ec55aeba992ccd711365fc684c1b4aa0600369e71263c38f817e14d1346396f40ee0033b7d6baf7c522672fe3bff968db951666e7339519d47c793563497a2615dac6ff09b1b85b03c0351f4080247a6", @generic="53e5cc55d0db93872062ca4963af85d65fc2a28250f6f38153c2c4b1e4435d22b72d73a6fba87e94f5d28d954e2cb69d2f0b889dbfc3841ef8f558e27d80aa1943652f406d62ebe88ffd5ae668ff93284c17206b837aaf60ab2dd10099cf52f5336278f4b52fc2d3a63945ec3f9faccc54ef9d8e87a92e2b9cf8f9e8024f1bd9", @typed={0x8, 0x59, 0x0, 0x0, @uid=r7}]}]}, 0x15d4}, 0x1, 0x0, 0x0, 0x20000800}, 0x41) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)={0x3, 'vlan0\x00', {0x8}, 0x1}) epoll_create1(0x0) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) clock_getres(0x5, &(0x7f0000000000)) 04:01:36 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036e04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000030058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3281.004249] device bond1460 entered promiscuous mode 04:01:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x1f00000000000000}) [ 3281.075043] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3281.096433] EXT4-fs (sda1): Remounting filesystem read-only [ 3281.127880] bond1460: making interface bridge2618 the new active one [ 3281.165063] device bridge2618 entered promiscuous mode [ 3281.172195] bond1460: Enslaving bridge2618 as an active interface with an up link 04:01:36 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000036f04000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3281.213517] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:36 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x1, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000140)=""/129) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = dup(r2) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r7 = socket(0x27, 0x3, 0x0) setsockopt$inet_int(r7, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local, r8}, 0xc) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_USE_IFADDR={0x5, 0x18, 0x1}]}}}]}, 0x3c}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f0000000200)={'veth1_to_batadv\x00', {0x2, 0x4e23, @remote}}) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="010200000000000a00001b00000008009a0002000000"], 0x1c}}, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r9, &(0x7f00000017c0), 0x1b4, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r9, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) epoll_create1(0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) sendfile(r1, r10, &(0x7f0000000280)=0x4ce, 0xffffffff) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) [ 3281.284834] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3281.311857] EXT4-fs (sda1): Remounting filesystem read-only 04:01:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2000000000000000}) 04:01:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d7, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000a0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:36 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x29400a0, 0x0) [ 3281.432528] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:36 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037004000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3281.555293] device bond1461 entered promiscuous mode 04:01:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2100000000000000}) 04:01:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000e0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3281.693746] bond1461: making interface bridge2620 the new active one [ 3281.718673] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3281.729791] device bridge2620 entered promiscuous mode 04:01:36 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037104000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3281.745469] bond1461: Enslaving bridge2620 as an active interface with an up link [ 3281.767697] EXT4-fs (sda1): Remounting filesystem read-only 04:01:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2200000000000000}) 04:01:37 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037204000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3281.882113] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000c00e0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3281.948474] bond1461: Enslaving bridge2621 as an active interface with a down link 04:01:37 executing program 4: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$FBIO_WAITFORVSYNC(r0, 0x40044620, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x201, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) epoll_create1(0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) fchmod(r4, 0x40) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r5, &(0x7f00000017c0), 0x1b4, 0x0) r6 = gettid() sched_rr_get_interval(r6, &(0x7f0000000140)) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000080)=0x0) r8 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xffffffffffffffe0, 0x100) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r8, 0x4010641c, &(0x7f0000000380)={r9, &(0x7f0000000300)=""/91}) tkill(r7, 0x9) epoll_create1(0x0) socket$inet(0xa, 0x0, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) 04:01:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d8, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3282.005143] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3282.035946] EXT4-fs (sda1): Remounting filesystem read-only 04:01:37 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037304000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:37 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x29400a0, 0x0) 04:01:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2300000000000000}) [ 3282.184548] device bond1462 entered promiscuous mode [ 3282.447596] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:01:37 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037404000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2400000000000000}) 04:01:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000001f0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:37 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037504000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2500000000000000}) 04:01:38 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030005000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3283.014315] bond1462: making interface bridge2622 the new active one [ 3283.025042] device bridge2622 entered promiscuous mode [ 3283.037807] bond1462: Enslaving bridge2622 as an active interface with an up link 04:01:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000ee3d0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3283.124578] bond1462: Enslaving bridge2623 as an active interface with a down link [ 3284.112526] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3284.150292] EXT4-fs: 1 callbacks suppressed [ 3284.150301] EXT4-fs (sda1): Remounting filesystem read-only [ 3285.616059] IPVS: ftp: loaded support on port[0] = 21 [ 3286.483276] chnl_net:caif_netlink_parms(): no params data found [ 3286.506914] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3286.525415] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3286.535169] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3286.548263] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3286.558158] device bridge_slave_1 left promiscuous mode [ 3286.569016] bridge0: port 2(bridge_slave_1) entered disabled state [ 3286.611786] device bridge_slave_0 left promiscuous mode [ 3286.617284] bridge0: port 1(bridge_slave_0) entered disabled state [ 3286.696639] device veth1_macvtap left promiscuous mode [ 3286.703074] device veth0_macvtap left promiscuous mode [ 3286.708480] device veth1_vlan left promiscuous mode [ 3286.718893] device veth0_vlan left promiscuous mode [ 3295.494882] device hsr_slave_1 left promiscuous mode [ 3295.536876] device hsr_slave_0 left promiscuous mode [ 3295.611593] team0 (unregistering): Port device team_slave_1 removed [ 3295.629908] team0 (unregistering): Port device team_slave_0 removed [ 3295.649581] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3295.698146] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3295.815625] bond0 (unregistering): Released all slaves [ 3295.999295] bridge0: port 1(bridge_slave_0) entered blocking state [ 3296.007735] bridge0: port 1(bridge_slave_0) entered disabled state [ 3296.022472] device bridge_slave_0 entered promiscuous mode [ 3296.080375] bridge0: port 2(bridge_slave_1) entered blocking state [ 3296.086745] bridge0: port 2(bridge_slave_1) entered disabled state [ 3296.120105] device bridge_slave_1 entered promiscuous mode [ 3296.172598] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3296.194188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3296.243386] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3296.262050] team0: Port device team_slave_0 added [ 3296.268466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3296.292186] team0: Port device team_slave_1 added [ 3296.326991] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3296.350269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3296.400244] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3296.414487] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3296.420809] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3296.446366] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3296.458340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3296.466836] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3296.544781] device hsr_slave_0 entered promiscuous mode [ 3296.601104] device hsr_slave_1 entered promiscuous mode [ 3296.641525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3296.649326] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3296.846194] bridge0: port 2(bridge_slave_1) entered blocking state [ 3296.852619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3296.859273] bridge0: port 1(bridge_slave_0) entered blocking state [ 3296.865662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3296.921281] bridge0: port 1(bridge_slave_0) entered disabled state [ 3296.930399] bridge0: port 2(bridge_slave_1) entered disabled state [ 3297.037559] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3297.063471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3297.094636] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3297.125733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3297.133747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3297.144786] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3297.160497] 8021q: adding VLAN 0 to HW filter on device team0 [ 3297.181118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3297.188324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3297.201582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3297.209298] bridge0: port 1(bridge_slave_0) entered blocking state [ 3297.215686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3297.226738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3297.236121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3297.245186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3297.257150] bridge0: port 2(bridge_slave_1) entered blocking state [ 3297.263676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3297.281629] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3297.301211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3297.313670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3297.325129] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3297.334079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3297.343207] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3297.361651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3297.373217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3297.381347] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3297.396888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3297.405450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3297.423427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3297.431232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3297.439078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3297.455924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3297.495917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3297.504909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3297.524144] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3297.530826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3297.582331] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3297.597073] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3297.603792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3297.617094] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3297.642295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3297.696232] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3297.707840] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3297.715767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3297.725069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3297.805831] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3297.819491] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3297.827911] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3297.862560] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3297.869380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3297.883491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3297.898535] device veth0_vlan entered promiscuous mode [ 3297.908597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3297.919334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3297.939381] device veth1_vlan entered promiscuous mode [ 3297.972994] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3297.986329] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3297.994639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3298.003790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3298.017680] device veth0_macvtap entered promiscuous mode [ 3298.026541] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3298.046530] device veth1_macvtap entered promiscuous mode [ 3298.056659] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3298.074378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3298.088581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3298.104492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3298.123189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.134316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3298.147740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.159053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3298.174982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.185106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3298.200080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.215583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3298.225450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.241963] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3298.249256] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3298.262845] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3298.277909] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3298.287377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3298.299524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3298.312638] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3298.323854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.333647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3298.344020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.354129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3298.364526] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.373977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3298.384002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.393512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3298.403554] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3298.414963] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3298.434815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3298.443537] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3298.451745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:01:53 executing program 4 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2600000000000000}) 04:01:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19d9, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:53 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030006000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000003f0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x22, 0x0, 0x0, 0x29400a0, 0x0) [ 3298.913226] validate_nla: 2 callbacks suppressed [ 3298.913235] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3298.925585] f2fs_msg: 134 callbacks suppressed [ 3298.925597] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3298.949622] FAULT_INJECTION: forcing a failure. [ 3298.949622] name failslab, interval 1, probability 0, space 0, times 0 [ 3298.956765] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3298.967333] CPU: 0 PID: 14415 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3298.976292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3298.985647] Call Trace: [ 3298.988265] dump_stack+0x188/0x20d [ 3298.991931] should_fail.cold+0xa/0x1b [ 3298.995838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3299.000964] __should_failslab+0x115/0x180 [ 3299.005208] should_failslab+0x5/0xf [ 3299.008931] kmem_cache_alloc_node+0x260/0x730 [ 3299.013622] __alloc_skb+0xba/0x5b0 [ 3299.017264] ? skb_trim+0x180/0x180 [ 3299.020909] ? netlink_autobind.isra.0+0x217/0x300 [ 3299.025855] netlink_sendmsg+0x8d6/0xcd0 [ 3299.029934] ? netlink_unicast+0x6a0/0x6a0 [ 3299.034179] ? sock_sendmsg+0x65/0x120 [ 3299.038077] ? netlink_unicast+0x6a0/0x6a0 [ 3299.042385] sock_sendmsg+0xcf/0x120 [ 3299.046113] sock_write_iter+0x283/0x3c0 [ 3299.050193] ? sock_sendmsg+0x120/0x120 [ 3299.054187] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3299.058783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3299.063555] do_iter_readv_writev+0x50c/0x790 [ 3299.068059] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3299.070903] device bond1463 entered promiscuous mode [ 3299.072911] ? security_file_permission+0x84/0x220 [ 3299.072926] ? rw_verify_area+0x107/0x330 [ 3299.072946] do_iter_write+0x185/0x5e0 [ 3299.072963] ? __fget+0x319/0x510 [ 3299.072979] vfs_writev+0x1b3/0x2f0 [ 3299.098275] ? vfs_iter_write+0xa0/0xa0 [ 3299.102246] ? check_preemption_disabled+0x41/0x280 [ 3299.107375] ? __fget+0x340/0x510 [ 3299.110847] ? iterate_fd+0x350/0x350 [ 3299.114681] ? __mutex_unlock_slowpath+0xea/0x670 [ 3299.119549] ? check_preemption_disabled+0x41/0x280 [ 3299.124582] ? __fget_light+0x1d1/0x230 [ 3299.128565] do_writev+0x136/0x330 [ 3299.132115] ? vfs_writev+0x2f0/0x2f0 [ 3299.135927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3299.140682] ? trace_hardirqs_off_caller+0x55/0x210 [ 3299.145699] ? do_syscall_64+0x21/0x620 [ 3299.149677] do_syscall_64+0xf9/0x620 [ 3299.153486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3299.158680] RIP: 0033:0x45c4a9 [ 3299.161876] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3299.180822] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3299.188529] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 [ 3299.195815] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3299.203083] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3299.210362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3299.217644] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000000 [ 3299.235481] F2FS-fs (loop2): Invalid log sectors per block(393219) log sectorsize(9) [ 3299.243553] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3299.278175] EXT4-fs (sda1): Remounting filesystem read-only [ 3299.285259] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3299.330160] kauditd_printk_skb: 11 callbacks suppressed [ 3299.330172] audit: type=1800 audit(1583640114.440:934): pid=14404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16487 res=0 [ 3299.337281] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3299.370591] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:01:54 executing program 4 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2700000000000000}) [ 3299.382329] bond1463: making interface bridge2624 the new active one [ 3299.395315] device bridge2624 entered promiscuous mode [ 3299.408588] F2FS-fs (loop2): Invalid log sectors per block(393219) log sectorsize(9) [ 3299.417054] bond1463: Enslaving bridge2624 as an active interface with an up link 04:01:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000001400058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3299.447141] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3299.448956] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3299.457066] EXT4-fs (sda1): Remounting filesystem read-only [ 3299.477041] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:01:54 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030007000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3299.537276] FAULT_INJECTION: forcing a failure. [ 3299.537276] name failslab, interval 1, probability 0, space 0, times 0 [ 3299.575338] CPU: 1 PID: 14529 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3299.583242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3299.592605] Call Trace: [ 3299.595199] dump_stack+0x188/0x20d [ 3299.598954] should_fail.cold+0xa/0x1b [ 3299.602860] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3299.607988] __should_failslab+0x115/0x180 [ 3299.612233] should_failslab+0x5/0xf [ 3299.615961] kmem_cache_alloc_node_trace+0x272/0x750 [ 3299.621089] __kmalloc_node_track_caller+0x38/0x70 [ 3299.626043] __kmalloc_reserve.isra.0+0x39/0xe0 [ 3299.630733] __alloc_skb+0xef/0x5b0 [ 3299.634376] ? skb_trim+0x180/0x180 [ 3299.638022] ? netlink_sendmsg+0x573/0xcd0 [ 3299.642269] ? netlink_sendmsg+0x8c1/0xcd0 [ 3299.646515] netlink_sendmsg+0x8d6/0xcd0 [ 3299.650595] ? netlink_unicast+0x6a0/0x6a0 [ 3299.654850] ? netlink_unicast+0x6a0/0x6a0 [ 3299.659100] sock_sendmsg+0xcf/0x120 [ 3299.662822] sock_write_iter+0x283/0x3c0 [ 3299.666788] audit: type=1800 audit(1583640114.780:935): pid=14531 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16737 res=0 [ 3299.666892] ? sock_sendmsg+0x120/0x120 [ 3299.693757] ? selinux_file_open+0x420/0x420 [ 3299.698182] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3299.702950] do_iter_readv_writev+0x50c/0x790 [ 3299.707460] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3299.712334] ? retint_kernel+0x2d/0x2d [ 3299.716241] do_iter_write+0x185/0x5e0 [ 3299.720135] ? vfs_writev+0x13a/0x2f0 [ 3299.723945] vfs_writev+0x1b3/0x2f0 [ 3299.727587] ? vfs_iter_write+0xa0/0xa0 [ 3299.731590] ? check_preemption_disabled+0x41/0x280 04:01:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19da, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2c, 0x0, 0x0, 0x29400a0, 0x0) [ 3299.736624] ? __fget+0x340/0x510 [ 3299.740089] ? iterate_fd+0x350/0x350 [ 3299.742534] audit: type=1800 audit(1583640114.810:936): pid=14535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16737 res=0 [ 3299.743901] ? __mutex_unlock_slowpath+0xea/0x670 [ 3299.743920] ? check_preemption_disabled+0x41/0x280 [ 3299.743937] ? __fget_light+0x1d1/0x230 [ 3299.743955] do_writev+0x136/0x330 [ 3299.784338] ? vfs_writev+0x2f0/0x2f0 [ 3299.788237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3299.793008] ? trace_hardirqs_off_caller+0x55/0x210 [ 3299.798032] ? do_syscall_64+0x21/0x620 [ 3299.802013] do_syscall_64+0xf9/0x620 [ 3299.805830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3299.811027] RIP: 0033:0x45c4a9 [ 3299.814275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3299.833185] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3299.840902] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 [ 3299.848172] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3299.855475] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3299.862747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3299.870014] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000001 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2800000000000000}) [ 3299.901081] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3299.915231] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3299.937889] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:01:55 executing program 4 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2900000000000000}) 04:01:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000c45d0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030009000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3300.046245] device bond1464 entered promiscuous mode [ 3300.083789] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3300.105219] EXT4-fs (sda1): Remounting filesystem read-only [ 3300.106124] FAULT_INJECTION: forcing a failure. [ 3300.106124] name failslab, interval 1, probability 0, space 0, times 0 [ 3300.159822] CPU: 0 PID: 14655 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3300.167833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3300.177189] Call Trace: [ 3300.179795] dump_stack+0x188/0x20d [ 3300.180557] bond1464: making interface bridge2625 the new active one [ 3300.183437] should_fail.cold+0xa/0x1b [ 3300.183457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3300.183478] ? __should_failslab+0x53/0x180 [ 3300.203242] ? __should_failslab+0x61/0x180 [ 3300.204865] device bridge2625 entered promiscuous mode [ 3300.207582] __should_failslab+0x115/0x180 [ 3300.207599] should_failslab+0x5/0xf [ 3300.207609] kmem_cache_alloc+0x44/0x710 [ 3300.207629] skb_clone+0x14f/0x3d0 [ 3300.228413] netlink_deliver_tap+0x959/0xb90 [ 3300.232845] netlink_unicast+0x547/0x6a0 [ 3300.236922] ? netlink_attachskb+0x710/0x710 [ 3300.241092] bond1464: Enslaving bridge2625 as an active interface with an up link [ 3300.241343] netlink_sendmsg+0x80b/0xcd0 [ 3300.253000] ? retint_kernel+0x2d/0x2d [ 3300.256901] ? netlink_unicast+0x6a0/0x6a0 [ 3300.261161] ? netlink_unicast+0x6a0/0x6a0 [ 3300.265413] sock_sendmsg+0xcf/0x120 [ 3300.269142] sock_write_iter+0x283/0x3c0 [ 3300.273216] ? sock_sendmsg+0x120/0x120 [ 3300.277220] do_iter_readv_writev+0x50c/0x790 [ 3300.281758] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3300.286526] ? selinux_file_permission+0x87/0x520 [ 3300.291396] ? security_file_permission+0x84/0x220 [ 3300.296345] do_iter_write+0x185/0x5e0 [ 3300.300243] ? vfs_writev+0x13a/0x2f0 [ 3300.304054] vfs_writev+0x1b3/0x2f0 [ 3300.307692] ? vfs_iter_write+0xa0/0xa0 [ 3300.311679] ? check_preemption_disabled+0x41/0x280 [ 3300.316715] ? __fget+0x340/0x510 [ 3300.320184] ? iterate_fd+0x350/0x350 [ 3300.323993] ? __mutex_unlock_slowpath+0xea/0x670 [ 3300.328853] ? check_preemption_disabled+0x41/0x280 [ 3300.333883] ? __fget_light+0x1d1/0x230 [ 3300.337875] do_writev+0x136/0x330 [ 3300.341427] ? vfs_writev+0x2f0/0x2f0 [ 3300.345246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3300.350010] ? trace_hardirqs_off_caller+0x55/0x210 [ 3300.355034] ? do_syscall_64+0x21/0x620 [ 3300.359027] do_syscall_64+0xf9/0x620 [ 3300.362844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3300.368036] RIP: 0033:0x45c4a9 [ 3300.371233] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3300.390135] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3300.397853] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2a00000000000000}) 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2b00000000000000}) 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2c00000000000000}) [ 3300.405129] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3300.412405] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3300.419681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3300.426952] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000002 [ 3300.455646] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3300.488751] bond1464: Enslaving bridge2626 as an active interface with a down link 04:01:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003000a000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19db, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:55 executing program 4 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3300.522520] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3300.540493] EXT4-fs (sda1): Remounting filesystem read-only [ 3300.626676] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3300.675590] device bond1465 entered promiscuous mode [ 3300.677599] FAULT_INJECTION: forcing a failure. [ 3300.677599] name failslab, interval 1, probability 0, space 0, times 0 [ 3300.710673] CPU: 1 PID: 14788 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3300.718691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3300.728043] Call Trace: [ 3300.730647] dump_stack+0x188/0x20d [ 3300.734288] should_fail.cold+0xa/0x1b [ 3300.738317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3300.743450] ? lock_is_held_type+0x17a/0x210 [ 3300.747877] __should_failslab+0x115/0x180 [ 3300.752123] should_failslab+0x5/0xf [ 3300.755872] kmem_cache_alloc_node+0x260/0x730 [ 3300.760464] ? mutex_trylock+0x1a0/0x1a0 [ 3300.764537] ? lock_downgrade+0x740/0x740 [ 3300.768697] __alloc_skb+0xba/0x5b0 [ 3300.772334] ? skb_trim+0x180/0x180 04:01:55 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x48, 0x0, 0x0, 0x29400a0, 0x0) 04:01:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000600058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:01:55 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003bb0e000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2d00000000000000}) [ 3300.775973] ? __mutex_unlock_slowpath+0xea/0x670 [ 3300.780823] ? lock_downgrade+0x740/0x740 [ 3300.784985] netlink_dump+0x5a5/0xb50 [ 3300.788799] __netlink_dump_start+0x4e9/0x6f0 [ 3300.793314] inet_diag_handler_cmd+0x23f/0x300 [ 3300.797909] ? inet_diag_rcv_msg_compat+0x300/0x300 [ 3300.802930] ? retint_kernel+0x2d/0x2d [ 3300.806828] ? inet_diag_dump_compat+0x300/0x300 [ 3300.811631] sock_diag_rcv_msg+0x2fe/0x3e0 [ 3300.815897] netlink_rcv_skb+0x160/0x410 [ 3300.819975] ? sock_diag_bind+0x80/0x80 [ 3300.824064] ? netlink_ack+0xa60/0xa60 [ 3300.827969] ? lock_downgrade+0x740/0x740 [ 3300.832136] sock_diag_rcv+0x26/0x40 [ 3300.835861] netlink_unicast+0x4d7/0x6a0 [ 3300.839940] ? netlink_attachskb+0x710/0x710 [ 3300.844377] netlink_sendmsg+0x80b/0xcd0 [ 3300.848451] ? netlink_unicast+0x6a0/0x6a0 [ 3300.852701] ? netlink_unicast+0x6a0/0x6a0 [ 3300.856947] sock_sendmsg+0xcf/0x120 [ 3300.860664] sock_write_iter+0x283/0x3c0 [ 3300.864738] ? sock_sendmsg+0x120/0x120 [ 3300.868732] ? selinux_file_open+0x420/0x420 [ 3300.873168] do_iter_readv_writev+0x50c/0x790 [ 3300.877681] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3300.882447] ? selinux_file_permission+0x87/0x520 [ 3300.887318] ? security_file_permission+0x84/0x220 [ 3300.892260] do_iter_write+0x185/0x5e0 [ 3300.896157] ? __fget+0x319/0x510 [ 3300.899618] vfs_writev+0x1b3/0x2f0 [ 3300.903255] ? vfs_iter_write+0xa0/0xa0 [ 3300.907241] ? check_preemption_disabled+0x41/0x280 [ 3300.910114] bond1465: making interface bridge2627 the new active one [ 3300.912272] ? __fget+0x340/0x510 [ 3300.912291] ? iterate_fd+0x350/0x350 [ 3300.912310] ? __mutex_unlock_slowpath+0xea/0x670 [ 3300.912329] ? check_preemption_disabled+0x41/0x280 [ 3300.912348] ? __fget_light+0x1d1/0x230 [ 3300.912364] do_writev+0x136/0x330 [ 3300.912380] ? vfs_writev+0x2f0/0x2f0 [ 3300.912394] ? __ia32_sys_clock_settime+0x260/0x260 [ 3300.912410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3300.912425] ? trace_hardirqs_off_caller+0x55/0x210 [ 3300.912441] ? do_syscall_64+0x21/0x620 [ 3300.912459] do_syscall_64+0xf9/0x620 [ 3300.912479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3300.932809] device bridge2627 entered promiscuous mode [ 3300.936021] RIP: 0033:0x45c4a9 [ 3300.936036] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3300.936044] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3300.936056] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 [ 3300.936067] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3300.954979] bond1465: Enslaving bridge2627 as an active interface with an up link [ 3300.957078] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3300.957086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3300.957094] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000003 04:01:56 executing program 4 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3301.075152] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030011000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2e00000000000000}) 04:01:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000ec00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3301.177955] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3301.207939] EXT4-fs (sda1): Remounting filesystem read-only 04:01:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003261d000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3301.227582] FAULT_INJECTION: forcing a failure. [ 3301.227582] name failslab, interval 1, probability 0, space 0, times 0 [ 3301.276276] CPU: 0 PID: 14914 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3301.284272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3301.293629] Call Trace: [ 3301.296231] dump_stack+0x188/0x20d [ 3301.299879] should_fail.cold+0xa/0x1b [ 3301.303788] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3301.308906] ? __lock_is_held+0xad/0x140 [ 3301.312986] __should_failslab+0x115/0x180 [ 3301.317227] should_failslab+0x5/0xf [ 3301.320946] kmem_cache_alloc_node_trace+0x272/0x750 [ 3301.326172] __kmalloc_node_track_caller+0x38/0x70 [ 3301.331126] __kmalloc_reserve.isra.0+0x39/0xe0 [ 3301.335810] __alloc_skb+0xef/0x5b0 [ 3301.339446] ? skb_trim+0x180/0x180 [ 3301.343095] netlink_dump+0x5a5/0xb50 [ 3301.346913] __netlink_dump_start+0x4e9/0x6f0 [ 3301.351418] ? inet_diag_handler_cmd+0x1ed/0x300 [ 3301.356187] inet_diag_handler_cmd+0x23f/0x300 [ 3301.360780] ? inet_diag_rcv_msg_compat+0x300/0x300 [ 3301.365800] ? retint_kernel+0x2d/0x2d [ 3301.369697] ? inet_diag_dump_compat+0x300/0x300 [ 3301.374477] sock_diag_rcv_msg+0x2fe/0x3e0 [ 3301.378732] netlink_rcv_skb+0x160/0x410 [ 3301.382808] ? sock_diag_bind+0x80/0x80 [ 3301.386796] ? netlink_ack+0xa60/0xa60 [ 3301.390700] ? lock_downgrade+0x740/0x740 [ 3301.394866] sock_diag_rcv+0x26/0x40 [ 3301.398590] netlink_unicast+0x4d7/0x6a0 [ 3301.402665] ? netlink_attachskb+0x710/0x710 [ 3301.407094] netlink_sendmsg+0x80b/0xcd0 [ 3301.411170] ? netlink_unicast+0x6a0/0x6a0 [ 3301.415423] ? netlink_unicast+0x6a0/0x6a0 [ 3301.419676] sock_sendmsg+0xcf/0x120 [ 3301.423406] sock_write_iter+0x283/0x3c0 [ 3301.427481] ? sock_sendmsg+0x120/0x120 [ 3301.431480] ? selinux_file_open+0x420/0x420 [ 3301.435898] do_iter_readv_writev+0x50c/0x790 [ 3301.440401] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3301.445176] ? selinux_file_permission+0x87/0x520 [ 3301.450026] ? security_file_permission+0x84/0x220 [ 3301.455064] do_iter_write+0x185/0x5e0 [ 3301.458969] ? vfs_writev+0x13a/0x2f0 [ 3301.462769] vfs_writev+0x1b3/0x2f0 [ 3301.466398] ? vfs_iter_write+0xa0/0xa0 [ 3301.470379] ? check_preemption_disabled+0x41/0x280 [ 3301.475408] ? __fget+0x340/0x510 [ 3301.478867] ? iterate_fd+0x350/0x350 [ 3301.482673] ? __mutex_unlock_slowpath+0xea/0x670 [ 3301.487521] ? check_preemption_disabled+0x41/0x280 [ 3301.492544] ? __fget_light+0x1d1/0x230 [ 3301.496526] do_writev+0x136/0x330 [ 3301.500073] ? vfs_writev+0x2f0/0x2f0 [ 3301.503878] ? __ia32_sys_clock_settime+0x260/0x260 [ 3301.508903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3301.513663] ? trace_hardirqs_off_caller+0x55/0x210 [ 3301.518683] ? do_syscall_64+0x21/0x620 [ 3301.522673] do_syscall_64+0xf9/0x620 [ 3301.526489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3301.531681] RIP: 0033:0x45c4a9 [ 3301.534879] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3301.553787] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3301.561499] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 [ 3301.568774] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 04:01:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19dc, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:01:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x2f00000000000000}) [ 3301.576048] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3301.583325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3301.590595] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000004 [ 3301.668800] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3301.697245] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3301.699058] EXT4-fs (sda1): Remounting filesystem read-only 04:01:56 executing program 4 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3301.798125] device bond1466 entered promiscuous mode 04:01:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x29400a0, 0x0) 04:01:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003001f000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3000000000000000}) 04:01:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000005dc40058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3301.969980] FAULT_INJECTION: forcing a failure. [ 3301.969980] name failslab, interval 1, probability 0, space 0, times 0 [ 3301.988489] bond1466: making interface bridge2629 the new active one [ 3301.995303] CPU: 1 PID: 15045 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3302.003197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3302.010321] device bridge2629 entered promiscuous mode [ 3302.012539] Call Trace: [ 3302.012558] dump_stack+0x188/0x20d [ 3302.012577] should_fail.cold+0xa/0x1b [ 3302.012590] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3302.012605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.018849] bond1466: Enslaving bridge2629 as an active interface with an up link [ 3302.020442] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.020459] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3302.020480] __should_failslab+0x115/0x180 [ 3302.020493] should_failslab+0x5/0xf [ 3302.020503] kmem_cache_alloc+0x44/0x710 [ 3302.020514] ? retint_kernel+0x2d/0x2d 04:01:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030020000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3100000000000000}) [ 3302.020532] skb_clone+0x14f/0x3d0 [ 3302.033414] audit: type=1800 audit(1583640117.150:937): pid=15051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16945 res=0 [ 3302.037868] netlink_deliver_tap+0x959/0xb90 [ 3302.037902] __netlink_sendskb+0x61/0xc0 [ 3302.037914] netlink_dump+0x5cf/0xb50 [ 3302.037930] __netlink_dump_start+0x4e9/0x6f0 [ 3302.086278] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3302.097201] inet_diag_handler_cmd+0x23f/0x300 [ 3302.097221] ? inet_diag_rcv_msg_compat+0x300/0x300 [ 3302.097234] ? retint_kernel+0x2d/0x2d [ 3302.097250] ? inet_diag_dump_compat+0x300/0x300 [ 3302.097272] ? sock_diag_rcv_msg+0x2d5/0x3e0 [ 3302.097291] sock_diag_rcv_msg+0x2fe/0x3e0 [ 3302.097312] netlink_rcv_skb+0x160/0x410 [ 3302.152297] ? sock_diag_bind+0x80/0x80 [ 3302.156280] ? netlink_ack+0xa60/0xa60 [ 3302.160178] ? lock_downgrade+0x740/0x740 [ 3302.164338] sock_diag_rcv+0x26/0x40 04:01:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19dd, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3302.168059] netlink_unicast+0x4d7/0x6a0 [ 3302.170287] bond1466: Enslaving bridge2630 as an active interface with a down link [ 3302.172128] ? netlink_attachskb+0x710/0x710 [ 3302.172167] netlink_sendmsg+0x80b/0xcd0 [ 3302.172185] ? netlink_unicast+0x6a0/0x6a0 [ 3302.172205] ? netlink_unicast+0x6a0/0x6a0 [ 3302.196800] sock_sendmsg+0xcf/0x120 [ 3302.200522] sock_write_iter+0x283/0x3c0 [ 3302.204595] ? sock_sendmsg+0x120/0x120 [ 3302.208591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.213359] do_iter_readv_writev+0x50c/0x790 [ 3302.217874] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3302.222644] ? retint_kernel+0x2d/0x2d [ 3302.226560] do_iter_write+0x185/0x5e0 [ 3302.230469] ? __fget+0x319/0x510 [ 3302.233935] vfs_writev+0x1b3/0x2f0 [ 3302.237573] ? vfs_iter_write+0xa0/0xa0 [ 3302.241556] ? check_preemption_disabled+0x41/0x280 [ 3302.246584] ? __fget+0x340/0x510 [ 3302.250045] ? iterate_fd+0x350/0x350 [ 3302.253855] ? __mutex_unlock_slowpath+0xea/0x670 [ 3302.258708] ? check_preemption_disabled+0x41/0x280 [ 3302.263735] ? __fget_light+0x1d1/0x230 [ 3302.267726] do_writev+0x136/0x330 [ 3302.271282] ? vfs_writev+0x2f0/0x2f0 [ 3302.275096] ? __ia32_sys_clock_settime+0x260/0x260 [ 3302.280125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3302.284885] ? trace_hardirqs_off_caller+0x55/0x210 [ 3302.289908] ? do_syscall_64+0x21/0x620 [ 3302.293922] do_syscall_64+0xf9/0x620 [ 3302.297757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3302.302954] RIP: 0033:0x45c4a9 [ 3302.306155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3302.325066] RSP: 002b:00007f979e01bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3302.332786] RAX: ffffffffffffffda RBX: 00007f979e01c6d4 RCX: 000000000045c4a9 [ 3302.340059] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3302.347336] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3302.354612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3302.361882] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000005 04:01:57 executing program 4 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3302.435295] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3302.458610] EXT4-fs (sda1): Remounting filesystem read-only [ 3302.458626] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030022000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3200000000000000}) 04:01:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000e00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3302.583214] device bond1467 entered promiscuous mode 04:01:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030023000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3302.629199] bond1467: making interface bridge2631 the new active one [ 3302.641112] device bridge2631 entered promiscuous mode [ 3302.701311] bond1467: Enslaving bridge2631 as an active interface with an up link 04:01:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x60, 0x0, 0x0, 0x29400a0, 0x0) 04:01:57 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003fc25000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:01:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3300000000000000}) [ 3302.820828] audit: type=1800 audit(1583640117.940:938): pid=15185 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16871 res=0 04:01:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000003dee0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3302.939078] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3302.982724] EXT4-fs (sda1): Remounting filesystem read-only 04:01:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3400000000000000}) 04:01:58 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000031d26000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3303.260195] bond1467: Enslaving bridge2632 as an active interface with a down link [ 3303.295532] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:01:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19de, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3303.342570] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3303.390787] EXT4-fs (sda1): Remounting filesystem read-only [ 3303.503594] device bond1468 entered promiscuous mode [ 3303.583862] bond1468: making interface bridge2633 the new active one [ 3303.599338] device bridge2633 entered promiscuous mode [ 3303.621487] bond1468: Enslaving bridge2633 as an active interface with an up link [ 3304.138295] validate_nla: 1 callbacks suppressed [ 3304.138303] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3304.193240] bond1468: Enslaving bridge2634 as an active interface with a down link [ 3306.067496] IPVS: ftp: loaded support on port[0] = 21 [ 3306.661847] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3306.668721] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3306.684295] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3306.695681] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3306.706599] device bridge_slave_1 left promiscuous mode [ 3306.716657] bridge0: port 2(bridge_slave_1) entered disabled state [ 3306.763567] device bridge_slave_0 left promiscuous mode [ 3306.769071] bridge0: port 1(bridge_slave_0) entered disabled state [ 3306.841864] device veth1_macvtap left promiscuous mode [ 3306.847196] device veth0_macvtap left promiscuous mode [ 3306.857732] device veth1_vlan left promiscuous mode [ 3306.862979] device veth0_vlan left promiscuous mode [ 3316.214065] device hsr_slave_1 left promiscuous mode [ 3316.256409] device hsr_slave_0 left promiscuous mode [ 3316.321874] team0 (unregistering): Port device team_slave_1 removed [ 3316.341757] team0 (unregistering): Port device team_slave_0 removed [ 3316.361995] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3316.416167] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3316.525109] bond0 (unregistering): Released all slaves [ 3316.594365] chnl_net:caif_netlink_parms(): no params data found [ 3316.684636] bridge0: port 1(bridge_slave_0) entered blocking state [ 3316.691139] bridge0: port 1(bridge_slave_0) entered disabled state [ 3316.699424] device bridge_slave_0 entered promiscuous mode [ 3316.707828] bridge0: port 2(bridge_slave_1) entered blocking state [ 3316.714380] bridge0: port 2(bridge_slave_1) entered disabled state [ 3316.722653] device bridge_slave_1 entered promiscuous mode [ 3316.748045] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3316.759766] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3316.790139] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3316.798982] team0: Port device team_slave_0 added [ 3316.805462] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3316.814476] team0: Port device team_slave_1 added [ 3316.910735] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3316.917019] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3316.996378] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3317.037215] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3317.043641] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3317.114740] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3317.141195] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3317.174690] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3317.274915] device hsr_slave_0 entered promiscuous mode [ 3317.331434] device hsr_slave_1 entered promiscuous mode [ 3317.373585] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3317.374884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3317.552664] bridge0: port 2(bridge_slave_1) entered blocking state [ 3317.559068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3317.565825] bridge0: port 1(bridge_slave_0) entered blocking state [ 3317.572324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3317.630516] bridge0: port 1(bridge_slave_0) entered disabled state [ 3317.640632] bridge0: port 2(bridge_slave_1) entered disabled state [ 3317.744019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3317.755316] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3317.767248] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3317.774083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3317.791356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3317.803532] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3317.809616] 8021q: adding VLAN 0 to HW filter on device team0 [ 3317.841385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3317.848771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3317.871444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3317.879160] bridge0: port 1(bridge_slave_0) entered blocking state [ 3317.885569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3317.916643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3317.942282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3317.954892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3317.970948] bridge0: port 2(bridge_slave_1) entered blocking state [ 3317.977342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3318.005549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3318.020746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3318.034048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3318.041511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3318.059519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3318.081322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3318.089938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3318.115379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3318.123152] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3318.135368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3318.164034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3318.180001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3318.188882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3318.197805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3318.209984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3318.217966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3318.226733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3318.238037] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3318.245325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3318.276896] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3318.289916] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3318.300069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3318.309549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3318.333293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3318.374358] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3318.419826] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3318.427301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3318.443760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3318.538138] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3318.552754] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3318.560131] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3318.578858] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3318.592153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3318.604775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3318.615710] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3318.627018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3318.639318] device veth0_vlan entered promiscuous mode [ 3318.664873] device veth1_vlan entered promiscuous mode [ 3318.698747] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3318.718324] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3318.729024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3318.745535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3318.759612] device veth0_macvtap entered promiscuous mode [ 3318.773198] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3318.789543] device veth1_macvtap entered promiscuous mode [ 3318.798333] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3318.817021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3318.834747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3318.849585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3318.864981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3318.874565] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3318.889479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3318.899581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3318.915706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3318.925476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3318.940374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3318.949718] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3318.965682] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3318.978049] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3318.986243] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3318.994271] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3319.002791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3319.010733] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3319.020860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3319.031867] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3319.042511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3319.052610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3319.062639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3319.072706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3319.085059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3319.094264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3319.109462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3319.118737] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3319.133851] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3319.146272] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3319.158889] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3319.167731] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3319.182312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3319.505174] FAULT_INJECTION: forcing a failure. [ 3319.505174] name failslab, interval 1, probability 0, space 0, times 0 [ 3319.516984] CPU: 1 PID: 15462 Comm: syz-executor.4 Not tainted 4.19.108-syzkaller #0 [ 3319.524883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3319.534244] Call Trace: [ 3319.536854] dump_stack+0x188/0x20d [ 3319.540503] should_fail.cold+0xa/0x1b [ 3319.544424] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3319.549547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3319.554328] __should_failslab+0x115/0x180 [ 3319.558580] should_failslab+0x5/0xf [ 3319.562308] kmem_cache_alloc+0x44/0x710 [ 3319.566390] ? lock_acquire+0x170/0x400 [ 3319.570391] ? netlink_deliver_tap+0x146/0xb90 [ 3319.574988] skb_clone+0x14f/0x3d0 [ 3319.578550] netlink_deliver_tap+0x959/0xb90 [ 3319.582986] __netlink_sendskb+0x61/0xc0 [ 3319.587064] netlink_dump+0x5cf/0xb50 [ 3319.590899] __netlink_dump_start+0x4e9/0x6f0 [ 3319.595612] inet_diag_handler_cmd+0x23f/0x300 [ 3319.600385] ? inet_diag_rcv_msg_compat+0x300/0x300 [ 3319.605524] ? inet_diag_dump_compat+0x300/0x300 [ 3319.610319] sock_diag_rcv_msg+0x2fe/0x3e0 [ 3319.614584] netlink_rcv_skb+0x160/0x410 [ 3319.618767] ? sock_diag_bind+0x80/0x80 [ 3319.622767] ? netlink_ack+0xa60/0xa60 [ 3319.626678] ? lock_downgrade+0x740/0x740 [ 3319.630856] sock_diag_rcv+0x26/0x40 [ 3319.634589] netlink_unicast+0x4d7/0x6a0 [ 3319.638666] ? netlink_attachskb+0x710/0x710 [ 3319.643115] netlink_sendmsg+0x80b/0xcd0 [ 3319.647203] ? netlink_unicast+0x6a0/0x6a0 [ 3319.651464] ? netlink_unicast+0x6a0/0x6a0 [ 3319.655723] sock_sendmsg+0xcf/0x120 [ 3319.663445] sock_write_iter+0x283/0x3c0 [ 3319.667525] ? sock_sendmsg+0x120/0x120 [ 3319.671531] ? selinux_file_open+0x420/0x420 [ 3319.675961] do_iter_readv_writev+0x50c/0x790 [ 3319.680474] ? vfs_dedupe_file_range+0x6d0/0x6d0 [ 3319.685250] ? selinux_file_permission+0x87/0x520 [ 3319.690117] ? security_file_permission+0x84/0x220 [ 3319.695069] do_iter_write+0x185/0x5e0 [ 3319.698977] ? vfs_writev+0x13a/0x2f0 [ 3319.702793] vfs_writev+0x1b3/0x2f0 [ 3319.706435] ? vfs_iter_write+0xa0/0xa0 [ 3319.710423] ? check_preemption_disabled+0x41/0x280 [ 3319.715457] ? __fget+0x340/0x510 [ 3319.718931] ? iterate_fd+0x350/0x350 [ 3319.722750] ? __mutex_unlock_slowpath+0xea/0x670 [ 3319.727610] ? check_preemption_disabled+0x41/0x280 [ 3319.732648] ? __fget_light+0x1d1/0x230 [ 3319.736636] do_writev+0x136/0x330 [ 3319.740357] ? vfs_writev+0x2f0/0x2f0 [ 3319.744176] ? __ia32_sys_clock_settime+0x260/0x260 [ 3319.749212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3319.753986] ? trace_hardirqs_off_caller+0x55/0x210 [ 3319.759290] ? do_syscall_64+0x21/0x620 [ 3319.763303] do_syscall_64+0xf9/0x620 [ 3319.767325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3319.772543] RIP: 0033:0x45c4a9 [ 3319.775755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3319.794674] RSP: 002b:00007f6e4a7cec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 3319.802398] RAX: ffffffffffffffda RBX: 00007f6e4a7cf6d4 RCX: 000000000045c4a9 [ 3319.809684] RDX: 0000000000000001 RSI: 0000000020000140 RDI: 0000000000000006 [ 3319.816976] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3319.824380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 3319.831664] R13: 0000000000000d10 R14: 00000000004cae03 R15: 0000000000000006 04:02:15 executing program 4 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3500000000000000}) 04:02:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000f00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000037b26000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x29400a0, 0x0) 04:02:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19df, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3319.956344] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3319.986408] f2fs_msg: 94 callbacks suppressed [ 3319.986419] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3320.006361] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3320.019746] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3320.034830] F2FS-fs (loop2): Invalid log sectors per block(2521859) log sectorsize(9) [ 3320.043077] EXT4-fs (sda1): Remounting filesystem read-only [ 3320.058093] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3320.074311] audit: type=1800 audit(1583640135.190:939): pid=15471 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16651 res=0 [ 3320.076811] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:02:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3600000000000000}) [ 3320.118409] device bond1469 entered promiscuous mode [ 3320.129684] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:02:15 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3320.165566] F2FS-fs (loop2): Invalid log sectors per block(2521859) log sectorsize(9) [ 3320.180698] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:02:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000000c0000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3320.246387] bond1469: making interface bridge2635 the new active one [ 3320.260615] device bridge2635 entered promiscuous mode [ 3320.292119] bond1469: Enslaving bridge2635 as an active interface with an up link 04:02:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030428000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3320.334177] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3320.349651] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3320.359284] EXT4-fs (sda1): Remounting filesystem read-only [ 3320.368624] audit: type=1800 audit(1583640135.490:940): pid=15592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16533 res=0 [ 3320.423688] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:02:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x29400a0, 0x0) 04:02:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3700000000000000}) [ 3320.458721] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3320.530103] bond1469: Enslaving bridge2636 as an active interface with a down link 04:02:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003002c000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000ec0000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:15 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="0f0000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3800000000000000}) [ 3320.700456] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3320.702109] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3320.708205] EXT4-fs (sda1): Remounting filesystem read-only [ 3320.721991] audit: type=1800 audit(1583640135.840:941): pid=15711 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16534 res=0 04:02:15 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003003f000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:15 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="480000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3320.829116] device bond1470 entered promiscuous mode 04:02:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030040000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3320.907352] bond1470: making interface bridge2637 the new active one [ 3320.940500] device bridge2637 entered promiscuous mode 04:02:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000200000d8000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3320.964480] bond1470: Enslaving bridge2637 as an active interface with an up link [ 3321.007589] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3321.015934] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3321.029064] EXT4-fs (sda1): Remounting filesystem read-only 04:02:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="c00000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3321.168272] bond1470: Enslaving bridge2638 as an active interface with a down link 04:02:16 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x74, 0x0, 0x0, 0x29400a0, 0x0) 04:02:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030048000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000033fe0000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:16 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003004c000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3321.361209] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="c00e00001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3321.447927] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3321.495651] EXT4-fs (sda1): Remounting filesystem read-only [ 3321.519862] device bond1471 entered promiscuous mode [ 3321.632890] bond1471: making interface bridge2639 the new active one [ 3321.650416] device bridge2639 entered promiscuous mode [ 3321.662172] bond1471: Enslaving bridge2639 as an active interface with an up link [ 3321.715063] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3321.733783] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3321.760366] EXT4-fs (sda1): Remounting filesystem read-only [ 3321.795012] bond1471: Enslaving bridge2640 as an active interface with a down link [ 3321.967043] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3321.994671] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3322.039039] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3322.046447] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3322.078565] device bridge_slave_1 left promiscuous mode [ 3322.084761] bridge0: port 2(bridge_slave_1) entered disabled state [ 3322.157686] device bridge_slave_0 left promiscuous mode [ 3322.175582] bridge0: port 1(bridge_slave_0) entered disabled state [ 3322.255704] device veth1_macvtap left promiscuous mode [ 3322.276158] device veth0_macvtap left promiscuous mode [ 3322.295982] device veth1_vlan left promiscuous mode [ 3322.301191] device veth0_vlan left promiscuous mode [ 3322.583783] device hsr_slave_1 left promiscuous mode [ 3322.626880] device hsr_slave_0 left promiscuous mode [ 3322.702749] team0 (unregistering): Port device team_slave_1 removed [ 3322.722843] team0 (unregistering): Port device team_slave_0 removed [ 3322.744037] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3322.823402] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3322.936955] bond0 (unregistering): Released all slaves [ 3323.566075] IPVS: ftp: loaded support on port[0] = 21 [ 3323.764526] chnl_net:caif_netlink_parms(): no params data found [ 3323.872517] bridge0: port 1(bridge_slave_0) entered blocking state [ 3323.879101] bridge0: port 1(bridge_slave_0) entered disabled state [ 3323.907332] device bridge_slave_0 entered promiscuous mode [ 3323.927337] bridge0: port 2(bridge_slave_1) entered blocking state [ 3323.944419] bridge0: port 2(bridge_slave_1) entered disabled state [ 3323.981054] device bridge_slave_1 entered promiscuous mode [ 3324.019851] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3324.054606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3324.098754] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3324.122442] team0: Port device team_slave_0 added [ 3324.128891] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3324.167970] team0: Port device team_slave_1 added [ 3324.199518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3324.211871] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3324.250256] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3324.274269] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3324.290276] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3324.345603] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3324.374866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3324.407841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3324.515945] device hsr_slave_0 entered promiscuous mode [ 3324.571693] device hsr_slave_1 entered promiscuous mode [ 3324.611883] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3324.619908] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3324.787300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3324.918471] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 3324.942967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3324.981055] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3325.001562] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3325.008277] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3325.019707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3325.033224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3325.047719] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3325.055335] 8021q: adding VLAN 0 to HW filter on device team0 [ 3325.075541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3325.085511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3325.095725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3325.103956] bridge0: port 1(bridge_slave_0) entered blocking state [ 3325.110376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3325.123131] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3325.131553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3325.139058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3325.148513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3325.157161] bridge0: port 2(bridge_slave_1) entered blocking state [ 3325.163686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3325.176653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3325.185311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3325.198671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3325.206614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3325.220635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3325.227684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3325.237621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3325.253528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3325.261391] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3325.268890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3325.278809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3325.291227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3325.300730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3325.308712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3325.319576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3325.330837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3325.339062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3325.351664] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3325.357946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3325.381871] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3325.394224] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3325.401140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3325.408085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3325.422550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3325.442676] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3325.455663] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3325.463747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3325.473584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3325.541264] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3325.549278] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3325.564624] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3325.579441] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3325.593647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3325.605406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3325.616514] device veth0_vlan entered promiscuous mode [ 3325.624406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3325.633148] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3325.651373] device veth1_vlan entered promiscuous mode [ 3325.657643] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3325.677027] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3325.707890] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3325.736389] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3325.750082] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3325.758979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3325.772983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3325.786815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3325.805332] device veth0_macvtap entered promiscuous mode [ 3325.814527] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3325.833932] device veth1_macvtap entered promiscuous mode [ 3325.845686] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3325.865080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3325.885021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3325.897835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3325.914256] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3325.926070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3325.942310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3325.955825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3325.967603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3325.983321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3325.995877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.008538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3326.024365] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.039647] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3326.053165] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3326.063618] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3326.074798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3326.085406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3326.098372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3326.112942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3326.130686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.139951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3326.156085] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.166029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3326.181788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.196230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3326.207205] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.222263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3326.236222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3326.254701] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3326.264090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3326.276855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3326.287998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:02:21 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030454000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff00000000000000ffff000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="e03f03001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e2, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3900000000000000}) 04:02:21 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, 0x0, 0x29400a0, 0x0) [ 3326.683243] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3326.736403] f2fs_msg: 46 callbacks suppressed [ 3326.736416] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3326.770291] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3326.773319] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3326.797134] F2FS-fs (loop2): Invalid log sectors per block(5506051) log sectorsize(9) [ 3326.805102] EXT4-fs (sda1): Remounting filesystem read-only [ 3326.812672] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3326.842954] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3326.843496] device bond1472 entered promiscuous mode [ 3326.868173] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:02:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="d80000201400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000020058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3326.920390] F2FS-fs (loop2): Invalid log sectors per block(5506051) log sectorsize(9) [ 3326.938688] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 3326.940460] audit: type=1800 audit(1583640142.050:942): pid=16135 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16860 res=0 04:02:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3a00000000000000}) [ 3327.035252] bond1472: making interface bridge2641 the new active one 04:02:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030455000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3327.077228] device bridge2641 entered promiscuous mode [ 3327.096036] bond1472: Enslaving bridge2641 as an active interface with an up link [ 3327.156522] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3327.171614] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000030058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="00f0ff7f1400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3327.199681] EXT4-fs (sda1): Remounting filesystem read-only [ 3327.229583] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3327.273510] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3327.274594] bond1472: Enslaving bridge2642 as an active interface with a down link [ 3327.320701] audit: type=1800 audit(1583640142.430:943): pid=16249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16756 res=0 04:02:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3b00000000000000}) 04:02:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e3, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030456000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:22 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0, 0x0, 0x29400a0, 0x0) 04:02:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000000f00192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3327.468151] audit: type=1800 audit(1583640142.460:944): pid=16359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16756 res=0 [ 3327.480801] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000040058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:22 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030457000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3c00000000000000}) [ 3327.607922] audit: type=1800 audit(1583640142.720:945): pid=16430 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16810 res=0 [ 3327.626266] device bond1473 entered promiscuous mode [ 3327.635531] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pig=16482 comm=syz-executor.4 [ 3327.714679] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3327.772441] EXT4-fs (sda1): Remounting filesystem read-only [ 3327.803416] bond1473: making interface bridge2643 the new active one [ 3327.817736] device bridge2643 entered promiscuous mode [ 3327.824909] audit: type=1800 audit(1583640142.940:946): pid=16497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16818 res=0 [ 3327.827013] bond1473: Enslaving bridge2643 as an active interface with an up link 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030458000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3d00000000000000}) [ 3327.862794] audit: type=1800 audit(1583640142.970:947): pid=16498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16818 res=0 [ 3327.922086] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3327.922185] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3327.929843] EXT4-fs (sda1): Remounting filesystem read-only 04:02:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001200192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030459000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3e00000000000000}) [ 3328.116862] bond1473: Enslaving bridge2644 as an active interface with a down link 04:02:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e4, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000a0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:23 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x29400a0, 0x0) 04:02:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001300192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045a000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3328.271811] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x3f00000000000000}) [ 3328.347337] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045b000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff0000000000000e0058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3328.400327] EXT4-fs (sda1): Remounting filesystem read-only [ 3328.401539] device bond1474 entered promiscuous mode 04:02:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580200001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x4000000000000000}) [ 3328.513336] bond1474: making interface bridge2645 the new active one [ 3328.524753] device bridge2645 entered promiscuous mode [ 3328.546100] bond1474: Enslaving bridge2645 as an active interface with an up link 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045c000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3328.584645] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3328.623977] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:02:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580300001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3328.649330] EXT4-fs (sda1): Remounting filesystem read-only [ 3328.654748] bond1474: Enslaving bridge2646 as an active interface with a down link 04:02:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e5, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000600058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:23 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x29400a0, 0x0) 04:02:23 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045d000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x4100000000000000}) 04:02:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000e00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045e000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3329.031617] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3329.047209] EXT4-fs (sda1): Remounting filesystem read-only 04:02:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xe4ffffff00000000}) 04:02:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003045f000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000f00058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3329.412110] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3329.419858] audit: type=1800 audit(1583640144.530:948): pid=17115 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16803 res=0 04:02:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030060000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3329.517997] audit: type=1800 audit(1583640144.560:949): pid=17121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16803 res=0 [ 3329.538303] device bond1475 entered promiscuous mode [ 3329.618525] bond1475: making interface bridge2647 the new active one [ 3329.638278] device bridge2647 entered promiscuous mode [ 3329.664493] bond1475: Enslaving bridge2647 as an active interface with an up link [ 3330.320510] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3330.337750] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3330.375959] EXT4-fs (sda1): Remounting filesystem read-only [ 3330.441445] bond1475: Enslaving bridge2648 as an active interface with a down link [ 3332.297027] IPVS: ftp: loaded support on port[0] = 21 [ 3332.934898] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3332.946105] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3332.956663] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3332.968064] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3332.979679] device bridge_slave_1 left promiscuous mode [ 3332.989768] bridge0: port 2(bridge_slave_1) entered disabled state [ 3333.046589] device bridge_slave_0 left promiscuous mode [ 3333.052281] bridge0: port 1(bridge_slave_0) entered disabled state [ 3333.118949] device veth1_macvtap left promiscuous mode [ 3333.124517] device veth0_macvtap left promiscuous mode [ 3333.129850] device veth1_vlan left promiscuous mode [ 3333.140104] device veth0_vlan left promiscuous mode [ 3343.445183] device hsr_slave_1 left promiscuous mode [ 3343.505820] device hsr_slave_0 left promiscuous mode [ 3343.581352] team0 (unregistering): Port device team_slave_1 removed [ 3343.602386] team0 (unregistering): Port device team_slave_0 removed [ 3343.621906] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3343.669964] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 3343.786131] bond0 (unregistering): Released all slaves [ 3343.856147] chnl_net:caif_netlink_parms(): no params data found [ 3344.050354] bridge0: port 1(bridge_slave_0) entered blocking state [ 3344.056745] bridge0: port 1(bridge_slave_0) entered disabled state [ 3344.088403] device bridge_slave_0 entered promiscuous mode [ 3344.097537] bridge0: port 2(bridge_slave_1) entered blocking state [ 3344.109475] bridge0: port 2(bridge_slave_1) entered disabled state [ 3344.118405] device bridge_slave_1 entered promiscuous mode [ 3344.159022] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3344.177208] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3344.214059] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3344.225317] team0: Port device team_slave_0 added [ 3344.234845] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3344.256891] team0: Port device team_slave_1 added [ 3344.323917] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3344.340248] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3344.395355] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3344.421234] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3344.427505] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3344.500270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3344.522558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3344.541226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3344.624858] device hsr_slave_0 entered promiscuous mode [ 3344.681615] device hsr_slave_1 entered promiscuous mode [ 3344.721926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3344.740562] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3345.003948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3345.092172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3345.103164] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3345.122213] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3345.128583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3345.141142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3345.170261] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3345.176366] 8021q: adding VLAN 0 to HW filter on device team0 [ 3345.193524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3345.206149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3345.226460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3345.251083] bridge0: port 1(bridge_slave_0) entered blocking state [ 3345.257456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3345.274676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3345.296018] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3345.304400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3345.321244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3345.329105] bridge0: port 2(bridge_slave_1) entered blocking state [ 3345.335497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3345.353239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3345.361443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3345.374991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3345.387271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3345.408584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3345.425897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3345.435771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3345.454134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3345.466703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3345.486305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3345.495396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3345.512604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3345.526451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3345.535413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3345.552665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3345.570021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3345.578148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3345.595273] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3345.606595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3345.631176] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3345.639978] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3345.646523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3345.654316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3345.668197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3345.727045] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3345.740185] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3345.763700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3345.776682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3345.868711] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3345.879000] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3345.893031] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3345.921706] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3345.929182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3345.951803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3345.962422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3345.970108] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3346.005061] device veth0_vlan entered promiscuous mode [ 3346.030073] device veth1_vlan entered promiscuous mode [ 3346.070328] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3346.083752] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3346.091724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3346.099907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3346.118816] device veth0_macvtap entered promiscuous mode [ 3346.126586] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3346.139093] device veth1_macvtap entered promiscuous mode [ 3346.146507] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3346.158387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3346.172089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3346.183813] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3346.194010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.203988] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3346.214259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.225248] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3346.235325] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.244991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3346.255156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.264702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3346.274810] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.286601] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3346.295116] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3346.303970] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3346.312756] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3346.320780] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3346.331426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3346.342514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3346.354060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.364182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3346.374222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.384291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3346.394338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.403847] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3346.414275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.423854] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3346.434392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3346.445946] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3346.454011] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3346.462900] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3346.471937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:02:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580400001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xf0ffffff00000000}) 04:02:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000400158000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:42 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030068000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x29400a0, 0x0) 04:02:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e6, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3346.932596] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3346.951431] f2fs_msg: 94 callbacks suppressed [ 3346.951445] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3347.000739] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3347.031977] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3347.038428] F2FS-fs (loop2): Invalid log sectors per block(6815747) log sectorsize(9) [ 3347.048532] EXT4-fs (sda1): Remounting filesystem read-only [ 3347.054896] audit: type=1800 audit(1583640162.170:950): pid=17278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16925 res=0 [ 3347.059491] device bond1476 entered promiscuous mode [ 3347.081606] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:02:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfdfdffff00000000}) 04:02:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580600001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.111515] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 3347.129068] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 3347.144257] F2FS-fs (loop2): Invalid log sectors per block(6815747) log sectorsize(9) [ 3347.204116] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 04:02:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000358000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.275504] bond1476: making interface bridge2649 the new active one [ 3347.288225] device bridge2649 entered promiscuous mode 04:02:42 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030469000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3347.320845] bond1476: Enslaving bridge2649 as an active interface with an up link 04:02:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xfeffffff00000000}) 04:02:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580a00001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.418985] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3347.428849] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3347.460798] EXT4-fs (sda1): Remounting filesystem read-only [ 3347.515050] audit: type=1800 audit(1583640162.630:951): pid=17411 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16562 res=0 04:02:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xff0f000000000000}) 04:02:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64000000000c0002000800010005f70000e28c5339465718010528a08f003554f442764e42402b5b43cf9d7467b30b7ee982eab323870a052d610f42d81b7579d2fb5e0000e6ff7ef6878de822e709b23b13cb2d7dffff0000000000da448529864fb65ba4e45bca59751e5b1415238c3b9a062bf1dd1cd12b82f256668bbf8e50bce17a137ae026e12160a9a8f3c9fbc977521352c6709a65d9fc090146945e23e0e03dec41119e5983fc8700536616d273c10e4ea826b391cb7ae01a03b81018e06a3289acf5ef96be06ca7f62310abf4cf2000000000000000000000000000000434c0c5c3d09299f03d700c837f78314d046cdc336be12cf90496d22d50f6b8bde1085314e3a9e131de89bb5304be14ff9000009a6ebff791f5a1a8581720a44e6447485e12c22796a846a54962b9bfa3f3281a4766826254bfe41df0fbbf114e9e118ba62f47a3c250c085c5e71784e14e1b5f4316e8005168c20b1dd3b0737fc47ebc4732a49eee10f8a260c05fee5ba2c609ba85ca1160d50a547e8803592d434a1387f78ac"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e7, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3347.558294] bond1476: Enslaving bridge2650 as an active interface with a down link [ 3347.591723] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 04:02:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x29400a0, 0x0) 04:02:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580e00001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.648162] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3347.660692] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:02:42 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046a000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3347.744524] device bond1477 entered promiscuous mode 04:02:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0xffffffff00000000}) 04:02:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000a58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.882693] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3347.894463] EXT4-fs (sda1): Remounting filesystem read-only [ 3347.904315] bond1477: making interface bridge2651 the new active one [ 3347.911234] device bridge2651 entered promiscuous mode 04:02:43 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046b000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="586000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3347.942275] bond1477: Enslaving bridge2651 as an active interface with an up link [ 3348.073804] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3348.106424] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:02:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x2}) [ 3348.120071] EXT4-fs (sda1): Remounting filesystem read-only 04:02:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58e000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:43 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003006c000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3348.188691] bond1477: Enslaving bridge2652 as an active interface with a down link 04:02:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e8, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:43 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xebb, 0x0, 0x0, 0x29400a0, 0x0) 04:02:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000e58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3348.309856] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:43 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046c000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x3}) 04:02:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58f000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3348.440507] device bond1478 entered promiscuous mode [ 3348.471910] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3348.500664] EXT4-fs (sda1): Remounting filesystem read-only 04:02:43 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046d000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x4}) 04:02:43 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="584001001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3348.596212] bond1478: making interface bridge2653 the new active one [ 3348.645759] device bridge2653 entered promiscuous mode 04:02:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000c00e58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3348.667262] bond1478: Enslaving bridge2653 as an active interface with an up link [ 3348.716124] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3348.724055] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3348.738563] EXT4-fs (sda1): Remounting filesystem read-only 04:02:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x5}) 04:02:43 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046e000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19e9, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580003001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x29400a0, 0x0) [ 3348.902125] bond1478: Enslaving bridge2654 as an active interface with a down link 04:02:44 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003046f000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x6}) [ 3349.022713] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 04:02:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000001f58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580006001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3349.107172] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3349.132749] device bond1479 entered promiscuous mode [ 3349.143995] EXT4-fs (sda1): Remounting filesystem read-only 04:02:44 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030470000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3349.195794] bond1479: making interface bridge2655 the new active one [ 3349.212279] device bridge2655 entered promiscuous mode [ 3349.236334] bond1479: Enslaving bridge2655 as an active interface with an up link [ 3349.261922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3349.272160] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3349.279790] EXT4-fs (sda1): Remounting filesystem read-only 04:02:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x7}) 04:02:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19ea, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3349.339573] bond1479: Enslaving bridge2656 as an active interface with a down link 04:02:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58000a001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000ee3d58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x29400a0, 0x0) 04:02:44 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030471000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3349.488552] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3349.535707] audit: type=1800 audit(1583640164.650:952): pid=17987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16950 res=0 [ 3349.596227] device bond1480 entered promiscuous mode 04:02:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58000e001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x8}) [ 3349.684970] bond1480: making interface bridge2657 the new active one 04:02:44 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030472000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000003f58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3349.730561] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3349.751669] EXT4-fs (sda1): Remounting filesystem read-only [ 3349.754509] device bridge2657 entered promiscuous mode 04:02:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x9}) [ 3349.813099] bond1480: Enslaving bridge2657 as an active interface with an up link 04:02:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58c00e001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3349.870170] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 3349.920459] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3349.943712] EXT4-fs (sda1): Remounting filesystem read-only 04:02:45 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030473000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19eb, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) 04:02:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0xa}) 04:02:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, 0x0, 0x29400a0, 0x0) [ 3350.016423] bond1480: Enslaving bridge2658 as an active interface with a down link [ 3350.033159] audit: type=1800 audit(1583640165.150:953): pid=18201 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16771 res=0 04:02:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000014058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58001f001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3350.165836] device bond1481 entered promiscuous mode 04:02:45 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030074000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3350.252388] audit: type=1800 audit(1583640165.370:954): pid=18325 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16771 res=0 [ 3350.276448] bond1481: making interface bridge2659 the new active one [ 3350.290449] device bridge2659 entered promiscuous mode 04:02:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0xb}) [ 3350.302487] bond1481: Enslaving bridge2659 as an active interface with an up link [ 3350.318402] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:02:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580140001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:45 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="29cd8c28e8b039d9862bc579b0664ad1ad5ec0afa12b3584fc45dd56c13c92c9834a175d751a29d2cea6a9806b299f0ed6431b0471f27957cda47c2a02214f9d2ef19aa4365bcc32c052e7c87eb7da36e1aadc06a4ced7f1ce727e4d976f4b88847e529991699d3f7eaf67f177b5b54452c372ef61f69ce1372fdbcb597fb645a77225991926068d6e4ab0319022a53e6b9d0d5d3f22492861498db1c1d7f82bb3e5c40f963fba7dcff6f8117225628ae119a525f24089dd56ee19b32c9529dd9e49fe7309ae15e1914fb84aec05d1bb2d31fd3cc11823ad850ed6c45651e23b152aa3ca5d4c1e3decf617056bd48792be19c74df39766f55a69c4de151ebde6bd3e2cd337394b7be8f0ad883324bd7488e22ca7ea4fb2cd5ffda44ec24a88260d0d7ddd36b82ad6e75c21c94d893f3f6cca533e09aeb3f1432cce761ba6f21e67adf257d2c71ef9c4f45ba9ed49e4694706fd1f5d8bd537956a5693ac049e2d25987932ff6cfc6f90a3f963003ef60a0880792135708ddd1fd17adaf5ddb60deece28a31c691b039d5f17eeebaff09f6779b8a6b34eb0b684d3411ec06f3db7da4fdf52645c4627a54c302e1851360fc7a9347c608b79e2d382e23ce622d6ac888e20d958b438fd5609d3a0d0185d2b5adc1c7f63cd2b33f0fe4d862c497f9bd9c6af15e19c8b861c1455e2123375e1962a8c0ee1fab52320af8c97b7c10b81645d"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030474000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3350.455954] bond1481: Enslaving bridge2660 as an active interface with a down link 04:02:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0xc19ec, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) [ 3350.541280] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3350.591841] audit: type=1800 audit(1583640165.700:955): pid=18437 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16771 res=0 04:02:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="58c45d001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0xc}) 04:02:45 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030475000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000c45d58000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 3350.678740] audit: type=1800 audit(1583640165.710:956): pid=18453 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16771 res=0 04:02:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x108b044, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2c00, 0x0, 0x0, 0x29400a0, 0x0) 04:02:46 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003007a000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) 04:02:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0xd}) 04:02:46 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f2010007000900000003267b000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3350.978306] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user 04:02:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580060001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x15, &(0x7f0000000340)={0x3, 0x0, 0x100000}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000006058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 04:02:46 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="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"}, 0x20) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030082000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000000000009381100080000000c00000010000000140000030000000100000002", 0x100e1, 0x1400}], 0x0, 0x0) [ 3351.518914] EXT4-fs error (device sda1): ext4_remount:5302: Abort forced by user [ 3353.986373] IPVS: ftp: loaded support on port[0] = 21 [ 3354.876518] chnl_net:caif_netlink_parms(): no params data found [ 3356.768906] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3356.777541] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3356.787345] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3356.795837] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3356.805691] device bridge_slave_1 left promiscuous mode [ 3356.812220] bridge0: port 2(bridge_slave_1) entered disabled state [ 3356.851234] device bridge_slave_0 left promiscuous mode [ 3356.856789] bridge0: port 1(bridge_slave_0) entered disabled state [ 3357.369474] device veth1_macvtap left promiscuous mode [ 3357.375105] device veth0_macvtap left promiscuous mode [ 3357.380909] device veth1_vlan left promiscuous mode [ 3357.385982] device veth0_vlan left promiscuous mode [ 3388.827513] bond1481 (unregistering): Releasing active interface bridge2660 [ 3388.933093] bond1481 (unregistering): Releasing active interface bridge2659 [ 3388.945595] device bridge2659 left promiscuous mode [ 3389.033615] bond1481 (unregistering): Released all slaves [ 3389.049228] bond1480 (unregistering): Releasing active interface bridge2658 [ 3389.133085] bond1480 (unregistering): Releasing active interface bridge2657 [ 3389.145730] device bridge2657 left promiscuous mode [ 3389.233671] bond1480 (unregistering): Released all slaves [ 3389.253612] bond1479 (unregistering): Releasing active interface bridge2656 [ 3389.352942] bond1479 (unregistering): Releasing active interface bridge2655 [ 3389.360095] device bridge2655 left promiscuous mode [ 3389.453632] bond1479 (unregistering): Released all slaves [ 3389.469714] bond1478 (unregistering): Releasing active interface bridge2654 [ 3389.553026] bond1478 (unregistering): Releasing active interface bridge2653 [ 3389.565749] device bridge2653 left promiscuous mode [ 3389.653846] bond1478 (unregistering): Released all slaves [ 3389.669988] bond1477 (unregistering): Releasing active interface bridge2652 [ 3389.753158] bond1477 (unregistering): Releasing active interface bridge2651 [ 3389.765927] device bridge2651 left promiscuous mode [ 3389.853716] bond1477 (unregistering): Released all slaves [ 3389.870529] bond1476 (unregistering): Releasing active interface bridge2650 [ 3389.952978] bond1476 (unregistering): Releasing active interface bridge2649 [ 3389.960130] device bridge2649 left promiscuous mode [ 3390.053390] bond1476 (unregistering): Released all slaves [ 3390.069019] bond1475 (unregistering): Releasing active interface bridge2648 [ 3390.156168] bond1475 (unregistering): Releasing active interface bridge2647 [ 3390.168824] device bridge2647 left promiscuous mode [ 3390.253687] bond1475 (unregistering): Released all slaves [ 3390.269985] bond1474 (unregistering): Releasing active interface bridge2646 [ 3390.372969] bond1474 (unregistering): Releasing active interface bridge2645 [ 3390.380121] device bridge2645 left promiscuous mode [ 3390.473709] bond1474 (unregistering): Released all slaves [ 3390.490723] bond1473 (unregistering): Releasing active interface bridge2644 [ 3390.572919] bond1473 (unregistering): Releasing active interface bridge2643 [ 3390.580058] device bridge2643 left promiscuous mode [ 3390.673748] bond1473 (unregistering): Released all slaves [ 3390.690774] bond1472 (unregistering): Releasing active interface bridge2642 [ 3390.772934] bond1472 (unregistering): Releasing active interface bridge2641 [ 3390.785677] device bridge2641 left promiscuous mode [ 3390.874484] bond1472 (unregistering): Released all slaves [ 3390.890835] bond1471 (unregistering): Releasing active interface bridge2640 [ 3390.983049] bond1471 (unregistering): Releasing active interface bridge2639 [ 3390.996688] device bridge2639 left promiscuous mode [ 3391.083531] bond1471 (unregistering): Released all slaves [ 3391.099331] bond1470 (unregistering): Releasing active interface bridge2638 [ 3391.183052] bond1470 (unregistering): Releasing active interface bridge2637 [ 3391.195649] device bridge2637 left promiscuous mode [ 3391.283772] bond1470 (unregistering): Released all slaves [ 3391.300121] bond1469 (unregistering): Releasing active interface bridge2636 [ 3391.383213] bond1469 (unregistering): Releasing active interface bridge2635 [ 3391.399699] device bridge2635 left promiscuous mode [ 3391.483672] bond1469 (unregistering): Released all slaves [ 3391.499740] bond1468 (unregistering): Releasing active interface bridge2634 [ 3391.593173] bond1468 (unregistering): Releasing active interface bridge2633 [ 3391.605757] device bridge2633 left promiscuous mode [ 3391.693629] bond1468 (unregistering): Released all slaves [ 3391.709842] bond1467 (unregistering): Releasing active interface bridge2632 [ 3391.792970] bond1467 (unregistering): Releasing active interface bridge2631 [ 3391.800125] device bridge2631 left promiscuous mode [ 3391.893944] bond1467 (unregistering): Released all slaves [ 3391.911776] bond1466 (unregistering): Releasing active interface bridge2630 [ 3392.003047] bond1466 (unregistering): Releasing active interface bridge2629 [ 3392.016162] device bridge2629 left promiscuous mode [ 3392.103810] bond1466 (unregistering): Released all slaves [ 3392.163318] bond1465 (unregistering): Releasing active interface bridge2627 [ 3392.176299] device bridge2627 left promiscuous mode [ 3392.263750] bond1465 (unregistering): Released all slaves [ 3392.281583] bond1464 (unregistering): Releasing active interface bridge2626 [ 3392.362635] bond1464 (unregistering): Releasing active interface bridge2625 [ 3392.369791] device bridge2625 left promiscuous mode [ 3392.463811] bond1464 (unregistering): Released all slaves [ 3392.479943] bond1463 (unregistering): Releasing active interface bridge2624 [ 3392.487262] device bridge2624 left promiscuous mode [ 3392.583734] bond1463 (unregistering): Released all slaves [ 3392.600536] bond1462 (unregistering): Releasing active interface bridge2623 [ 3392.683022] bond1462 (unregistering): Releasing active interface bridge2622 [ 3392.690171] device bridge2622 left promiscuous mode [ 3392.783768] bond1462 (unregistering): Released all slaves [ 3392.800006] bond1461 (unregistering): Releasing active interface bridge2621 [ 3392.885216] bond1461 (unregistering): Releasing active interface bridge2620 [ 3392.897723] device bridge2620 left promiscuous mode [ 3392.983632] bond1461 (unregistering): Released all slaves [ 3393.043100] bond1460 (unregistering): Releasing active interface bridge2618 [ 3393.055634] device bridge2618 left promiscuous mode [ 3393.143730] bond1460 (unregistering): Released all slaves [ 3393.162265] bond1459 (unregistering): Releasing active interface bridge2617 [ 3393.242937] bond1459 (unregistering): Releasing active interface bridge2616 [ 3393.256901] device bridge2616 left promiscuous mode [ 3393.344423] bond1459 (unregistering): Released all slaves [ 3393.360708] bond1458 (unregistering): Releasing active interface bridge2615 [ 3393.443021] bond1458 (unregistering): Releasing active interface bridge2614 [ 3393.450173] device bridge2614 left promiscuous mode [ 3393.543704] bond1458 (unregistering): Released all slaves [ 3393.560486] bond1457 (unregistering): Releasing active interface bridge2613 [ 3393.642904] bond1457 (unregistering): Releasing active interface bridge2612 [ 3393.650053] device bridge2612 left promiscuous mode [ 3393.743628] bond1457 (unregistering): Released all slaves [ 3393.759573] bond1456 (unregistering): Releasing active interface bridge2611 [ 3393.842946] bond1456 (unregistering): Releasing active interface bridge2610 [ 3393.850091] device bridge2610 left promiscuous mode [ 3393.943594] bond1456 (unregistering): Released all slaves [ 3393.963519] bond1455 (unregistering): Releasing active interface bridge2609 [ 3394.063121] bond1455 (unregistering): Releasing active interface bridge2608 [ 3394.075791] device bridge2608 left promiscuous mode [ 3394.163819] bond1455 (unregistering): Released all slaves [ 3394.179764] bond1454 (unregistering): Releasing active interface bridge2607 [ 3394.264558] bond1454 (unregistering): Releasing active interface bridge2606 [ 3394.280062] device bridge2606 left promiscuous mode [ 3394.363596] bond1454 (unregistering): Released all slaves [ 3394.379409] bond1453 (unregistering): Releasing active interface bridge2605 [ 3394.472843] bond1453 (unregistering): Releasing active interface bridge2604 [ 3394.480000] device bridge2604 left promiscuous mode [ 3394.573520] bond1453 (unregistering): Released all slaves [ 3394.633273] bond1452 (unregistering): Releasing active interface bridge2602 [ 3394.647352] device bridge2602 left promiscuous mode [ 3394.733751] bond1452 (unregistering): Released all slaves [ 3394.750586] bond1451 (unregistering): Releasing active interface bridge2601 [ 3394.843034] bond1451 (unregistering): Releasing active interface bridge2600 [ 3394.850183] device bridge2600 left promiscuous mode [ 3394.943893] bond1451 (unregistering): Released all slaves [ 3394.960137] bond1450 (unregistering): Releasing active interface bridge2599 [ 3395.044986] bond1450 (unregistering): Releasing active interface bridge2598 [ 3395.057310] device bridge2598 left promiscuous mode [ 3395.143689] bond1450 (unregistering): Released all slaves [ 3395.161269] bond1449 (unregistering): Releasing active interface bridge2597 [ 3395.242607] bond1449 (unregistering): Releasing active interface bridge2596 [ 3395.249791] device bridge2596 left promiscuous mode [ 3395.343746] bond1449 (unregistering): Released all slaves [ 3395.360102] bond1448 (unregistering): Releasing active interface bridge2595 [ 3395.442962] bond1448 (unregistering): Releasing active interface bridge2594 [ 3395.455549] device bridge2594 left promiscuous mode [ 3395.543720] bond1448 (unregistering): Released all slaves [ 3395.603640] bond1447 (unregistering): Released all slaves [ 3395.620196] bond1446 (unregistering): Releasing active interface bridge2592 [ 3395.627395] device bridge2592 left promiscuous mode [ 3395.723628] bond1446 (unregistering): Released all slaves [ 3395.739833] bond1445 (unregistering): Releasing active interface bridge2591 [ 3395.833077] bond1445 (unregistering): Releasing active interface bridge2590 [ 3395.845794] device bridge2590 left promiscuous mode [ 3395.933716] bond1445 (unregistering): Released all slaves [ 3395.949959] bond1444 (unregistering): Releasing active interface bridge2589 [ 3396.032971] bond1444 (unregistering): Releasing active interface bridge2588 [ 3396.040119] device bridge2588 left promiscuous mode [ 3396.143854] bond1444 (unregistering): Released all slaves [ 3396.160099] bond1443 (unregistering): Releasing active interface bridge2587 [ 3396.242851] bond1443 (unregistering): Releasing active interface bridge2586 [ 3396.249991] device bridge2586 left promiscuous mode [ 3396.344524] bond1443 (unregistering): Released all slaves [ 3396.361749] bond1442 (unregistering): Releasing active interface bridge2585 [ 3396.442956] bond1442 (unregistering): Releasing active interface bridge2584 [ 3396.450098] device bridge2584 left promiscuous mode [ 3396.543663] bond1442 (unregistering): Released all slaves [ 3396.559570] bond1441 (unregistering): Releasing active interface bridge2583 [ 3396.643083] bond1441 (unregistering): Releasing active interface bridge2582 [ 3396.655618] device bridge2582 left promiscuous mode [ 3396.743758] bond1441 (unregistering): Released all slaves [ 3396.760289] bond1440 (unregistering): Releasing active interface bridge2581 [ 3396.843121] bond1440 (unregistering): Releasing active interface bridge2580 [ 3396.855442] device bridge2580 left promiscuous mode [ 3396.943606] bond1440 (unregistering): Released all slaves [ 3396.959387] bond1439 (unregistering): Releasing active interface bridge2579 [ 3397.042933] bond1439 (unregistering): Releasing active interface bridge2578 [ 3397.050090] device bridge2578 left promiscuous mode [ 3397.143371] bond1439 (unregistering): Released all slaves [ 3397.159323] bond1438 (unregistering): Releasing active interface bridge2577 [ 3397.243019] bond1438 (unregistering): Releasing active interface bridge2576 [ 3397.250192] device bridge2576 left promiscuous mode [ 3397.343582] bond1438 (unregistering): Released all slaves [ 3397.359783] bond1437 (unregistering): Releasing active interface bridge2575 [ 3397.443014] bond1437 (unregistering): Releasing active interface bridge2574 [ 3397.450168] device bridge2574 left promiscuous mode [ 3397.543640] bond1437 (unregistering): Released all slaves [ 3397.563686] bond1436 (unregistering): Releasing active interface bridge2573 [ 3397.672965] bond1436 (unregistering): Releasing active interface bridge2572 [ 3397.685891] device bridge2572 left promiscuous mode [ 3397.774331] bond1436 (unregistering): Released all slaves [ 3397.790628] bond1435 (unregistering): Releasing active interface bridge2571 [ 3397.873110] bond1435 (unregistering): Releasing active interface bridge2570 [ 3397.885677] device bridge2570 left promiscuous mode [ 3397.983763] bond1435 (unregistering): Released all slaves [ 3397.999674] bond1434 (unregistering): Releasing active interface bridge2569 [ 3398.082812] bond1434 (unregistering): Releasing active interface bridge2568 [ 3398.089957] device bridge2568 left promiscuous mode [ 3398.183567] bond1434 (unregistering): Released all slaves [ 3398.198999] bond1433 (unregistering): Releasing active interface bridge2567 [ 3398.283322] bond1433 (unregistering): Releasing active interface bridge2566 [ 3398.296597] device bridge2566 left promiscuous mode [ 3398.383597] bond1433 (unregistering): Released all slaves [ 3398.399628] bond1432 (unregistering): Releasing active interface bridge2565 [ 3398.406852] device bridge2565 left promiscuous mode [ 3398.483676] bond1432 (unregistering): Released all slaves [ 3398.494349] bond1431 (unregistering): Releasing active interface bridge2564 [ 3398.582958] bond1431 (unregistering): Releasing active interface bridge2563 [ 3398.590104] device bridge2563 left promiscuous mode [ 3398.684313] bond1431 (unregistering): Released all slaves [ 3398.700355] bond1430 (unregistering): Releasing active interface bridge2562 [ 3398.782950] bond1430 (unregistering): Releasing active interface bridge2561 [ 3398.790101] device bridge2561 left promiscuous mode [ 3398.883592] bond1430 (unregistering): Released all slaves [ 3398.900191] bond1429 (unregistering): Releasing active interface bridge2560 [ 3398.982925] bond1429 (unregistering): Releasing active interface bridge2559 [ 3398.990086] device bridge2559 left promiscuous mode [ 3399.083394] bond1429 (unregistering): Released all slaves [ 3399.099312] bond1428 (unregistering): Releasing active interface bridge2558 [ 3399.182880] bond1428 (unregistering): Releasing active interface bridge2557 [ 3399.190021] device bridge2557 left promiscuous mode [ 3399.283663] bond1428 (unregistering): Released all slaves [ 3399.299783] bond1427 (unregistering): Releasing active interface bridge2556 [ 3399.382984] bond1427 (unregistering): Releasing active interface bridge2555 [ 3399.390124] device bridge2555 left promiscuous mode [ 3399.483589] bond1427 (unregistering): Released all slaves [ 3399.498837] bond1426 (unregistering): Releasing active interface bridge2554 [ 3399.582932] bond1426 (unregistering): Releasing active interface bridge2553 [ 3399.590079] device bridge2553 left promiscuous mode [ 3399.683589] bond1426 (unregistering): Released all slaves [ 3399.699713] bond1425 (unregistering): Releasing active interface bridge2552 [ 3399.783117] bond1425 (unregistering): Releasing active interface bridge2551 [ 3399.795698] device bridge2551 left promiscuous mode [ 3399.883712] bond1425 (unregistering): Released all slaves [ 3399.899743] bond1424 (unregistering): Releasing active interface bridge2550 [ 3399.983751] bond1424 (unregistering): Releasing active interface bridge2549 [ 3399.996508] device bridge2549 left promiscuous mode [ 3400.083810] bond1424 (unregistering): Released all slaves [ 3400.100108] bond1423 (unregistering): Releasing active interface bridge2548 [ 3400.182916] bond1423 (unregistering): Releasing active interface bridge2547 [ 3400.190160] device bridge2547 left promiscuous mode [ 3400.283702] bond1423 (unregistering): Released all slaves [ 3400.299886] bond1422 (unregistering): Releasing active interface bridge2546 [ 3400.392913] bond1422 (unregistering): Releasing active interface bridge2545 [ 3400.400083] device bridge2545 left promiscuous mode [ 3400.493629] bond1422 (unregistering): Released all slaves [ 3400.511558] bond1421 (unregistering): Releasing active interface bridge2544 [ 3400.592937] bond1421 (unregistering): Releasing active interface bridge2543 [ 3400.600087] device bridge2543 left promiscuous mode [ 3400.693559] bond1421 (unregistering): Released all slaves [ 3400.753243] bond1420 (unregistering): Releasing active interface bridge2541 [ 3400.768796] device bridge2541 left promiscuous mode [ 3400.853588] bond1420 (unregistering): Released all slaves [ 3400.904386] bond1419 (unregistering): Released all slaves [ 3400.915264] bond1418 (unregistering): Releasing active interface bridge2539 [ 3400.922437] device bridge2539 left promiscuous mode [ 3401.003716] bond1418 (unregistering): Released all slaves [ 3401.019904] bond1417 (unregistering): Releasing active interface bridge2538 [ 3401.028146] device bridge2538 left promiscuous mode [ 3401.123654] bond1417 (unregistering): Released all slaves [ 3401.140322] bond1416 (unregistering): Releasing active interface bridge2537 [ 3401.222940] bond1416 (unregistering): Releasing active interface bridge2536 [ 3401.230089] device bridge2536 left promiscuous mode [ 3401.323777] bond1416 (unregistering): Released all slaves [ 3401.340344] bond1415 (unregistering): Releasing active interface bridge2535 [ 3401.422935] bond1415 (unregistering): Releasing active interface bridge2534 [ 3401.430082] device bridge2534 left promiscuous mode [ 3401.523779] bond1415 (unregistering): Released all slaves [ 3401.544581] bond1414 (unregistering): Releasing active interface bridge2533 [ 3401.649871] bond1414 (unregistering): Releasing active interface bridge2532 [ 3401.657142] device bridge2532 left promiscuous mode [ 3401.743758] bond1414 (unregistering): Released all slaves [ 3401.760256] bond1413 (unregistering): Releasing active interface bridge2531 [ 3401.842932] bond1413 (unregistering): Releasing active interface bridge2530 [ 3401.850078] device bridge2530 left promiscuous mode [ 3401.943672] bond1413 (unregistering): Released all slaves [ 3401.961864] bond1412 (unregistering): Releasing active interface bridge2529 [ 3402.042946] bond1412 (unregistering): Releasing active interface bridge2528 [ 3402.050096] device bridge2528 left promiscuous mode [ 3402.143561] bond1412 (unregistering): Released all slaves [ 3402.160011] bond1411 (unregistering): Releasing active interface bridge2527 [ 3402.243055] bond1411 (unregistering): Releasing active interface bridge2526 [ 3402.255589] device bridge2526 left promiscuous mode [ 3402.343630] bond1411 (unregistering): Released all slaves [ 3402.360298] bond1410 (unregistering): Releasing active interface bridge2525 [ 3402.442977] bond1410 (unregistering): Releasing active interface bridge2524 [ 3402.450132] device bridge2524 left promiscuous mode [ 3402.545315] bond1410 (unregistering): Released all slaves [ 3402.561541] bond1409 (unregistering): Releasing active interface bridge2523 [ 3402.642998] bond1409 (unregistering): Releasing active interface bridge2522 [ 3402.650161] device bridge2522 left promiscuous mode [ 3402.743614] bond1409 (unregistering): Released all slaves [ 3402.764452] bond1408 (unregistering): Releasing active interface bridge2521 [ 3402.873298] bond1408 (unregistering): Releasing active interface bridge2520 [ 3402.886003] device bridge2520 left promiscuous mode [ 3402.974358] bond1408 (unregistering): Released all slaves [ 3402.991114] bond1407 (unregistering): Releasing active interface bridge2519 [ 3403.073054] bond1407 (unregistering): Releasing active interface bridge2518 [ 3403.085669] device bridge2518 left promiscuous mode [ 3403.173672] bond1407 (unregistering): Released all slaves [ 3403.190173] bond1406 (unregistering): Releasing active interface bridge2517 [ 3403.283072] bond1406 (unregistering): Releasing active interface bridge2516 [ 3403.295877] device bridge2516 left promiscuous mode [ 3403.383611] bond1406 (unregistering): Released all slaves [ 3403.399702] bond1405 (unregistering): Releasing active interface bridge2515 [ 3403.482919] bond1405 (unregistering): Releasing active interface bridge2514 [ 3403.490070] device bridge2514 left promiscuous mode [ 3403.583588] bond1405 (unregistering): Released all slaves [ 3403.596421] bond1404 (unregistering): Releasing active interface bridge2513 [ 3403.683041] bond1404 (unregistering): Releasing active interface bridge2512 [ 3403.695659] device bridge2512 left promiscuous mode [ 3403.783527] bond1404 (unregistering): Released all slaves [ 3403.804118] bond1403 (unregistering): Releasing active interface bridge2511 [ 3403.902796] bond1403 (unregistering): Releasing active interface bridge2510 [ 3403.909942] device bridge2510 left promiscuous mode [ 3404.003479] bond1403 (unregistering): Released all slaves [ 3404.020072] bond1402 (unregistering): Releasing active interface bridge2509 [ 3404.102977] bond1402 (unregistering): Releasing active interface bridge2508 [ 3404.110128] device bridge2508 left promiscuous mode [ 3404.203578] bond1402 (unregistering): Released all slaves [ 3404.214980] bond1401 (unregistering): Releasing active interface bridge2507 [ 3404.302999] bond1401 (unregistering): Releasing active interface bridge2506 [ 3404.310147] device bridge2506 left promiscuous mode [ 3404.404645] bond1401 (unregistering): Released all slaves [ 3404.420851] bond1400 (unregistering): Releasing active interface bridge2505 [ 3404.502992] bond1400 (unregistering): Releasing active interface bridge2504 [ 3404.510153] device bridge2504 left promiscuous mode [ 3404.603345] bond1400 (unregistering): Released all slaves [ 3404.619340] bond1399 (unregistering): Releasing active interface bridge2503 [ 3404.702963] bond1399 (unregistering): Releasing active interface bridge2502 [ 3404.710111] device bridge2502 left promiscuous mode [ 3404.804309] bond1399 (unregistering): Released all slaves [ 3404.820447] bond1398 (unregistering): Releasing active interface bridge2501 [ 3404.827557] device bridge2501 left promiscuous mode [ 3404.923295] bond1398 (unregistering): Released all slaves [ 3404.939726] bond1397 (unregistering): Releasing active interface bridge2500 [ 3405.022955] bond1397 (unregistering): Releasing active interface bridge2499 [ 3405.030104] device bridge2499 left promiscuous mode [ 3405.123735] bond1397 (unregistering): Released all slaves [ 3405.140142] bond1396 (unregistering): Releasing active interface bridge2498 [ 3405.222883] bond1396 (unregistering): Releasing active interface bridge2497 [ 3405.230050] device bridge2497 left promiscuous mode [ 3405.326058] bond1396 (unregistering): Released all slaves [ 3405.383193] bond1395 (unregistering): Releasing active interface bridge2495 [ 3405.397998] device bridge2495 left promiscuous mode [ 3405.483649] bond1395 (unregistering): Released all slaves [ 3405.500007] bond1394 (unregistering): Releasing active interface bridge2494 [ 3405.583714] bond1394 (unregistering): Releasing active interface bridge2493 [ 3405.596589] device bridge2493 left promiscuous mode [ 3405.683854] bond1394 (unregistering): Released all slaves [ 3405.700169] bond1393 (unregistering): Releasing active interface bridge2492 [ 3405.782908] bond1393 (unregistering): Releasing active interface bridge2491 [ 3405.790058] device bridge2491 left promiscuous mode [ 3405.883411] bond1393 (unregistering): Released all slaves [ 3405.899690] bond1392 (unregistering): Releasing active interface bridge2490 [ 3405.982947] bond1392 (unregistering): Releasing active interface bridge2489 [ 3405.990104] device bridge2489 left promiscuous mode [ 3406.083812] bond1392 (unregistering): Released all slaves [ 3406.143216] bond1391 (unregistering): Releasing active interface bridge2487 [ 3406.155903] device bridge2487 left promiscuous mode [ 3406.243679] bond1391 (unregistering): Released all slaves [ 3406.260250] bond1390 (unregistering): Releasing active interface bridge2486 [ 3406.342927] bond1390 (unregistering): Releasing active interface bridge2485 [ 3406.350081] device bridge2485 left promiscuous mode [ 3406.443557] bond1390 (unregistering): Released all slaves [ 3406.459849] bond1389 (unregistering): Releasing active interface bridge2484 [ 3406.543012] bond1389 (unregistering): Releasing active interface bridge2483 [ 3406.550168] device bridge2483 left promiscuous mode [ 3406.644943] bond1389 (unregistering): Released all slaves [ 3406.661355] bond1388 (unregistering): Releasing active interface bridge2482 [ 3406.742913] bond1388 (unregistering): Releasing active interface bridge2481 [ 3406.750058] device bridge2481 left promiscuous mode [ 3406.843604] bond1388 (unregistering): Released all slaves [ 3406.859561] bond1387 (unregistering): Releasing active interface bridge2480 [ 3406.942673] bond1387 (unregistering): Releasing active interface bridge2479 [ 3406.949814] device bridge2479 left promiscuous mode [ 3407.043475] bond1387 (unregistering): Released all slaves [ 3407.059104] bond1386 (unregistering): Releasing active interface bridge2478 [ 3407.143557] bond1386 (unregistering): Releasing active interface bridge2477 [ 3407.156226] device bridge2477 left promiscuous mode [ 3407.243588] bond1386 (unregistering): Released all slaves [ 3407.260143] bond1385 (unregistering): Releasing active interface bridge2476 [ 3407.343123] bond1385 (unregistering): Releasing active interface bridge2475 [ 3407.355650] device bridge2475 left promiscuous mode [ 3407.443547] bond1385 (unregistering): Released all slaves [ 3407.459743] bond1384 (unregistering): Releasing active interface bridge2474 [ 3407.542941] bond1384 (unregistering): Releasing active interface bridge2473 [ 3407.550177] device bridge2473 left promiscuous mode [ 3407.643570] bond1384 (unregistering): Released all slaves [ 3407.659885] bond1383 (unregistering): Releasing active interface bridge2472 [ 3407.667847] device bridge2472 left promiscuous mode [ 3407.763721] bond1383 (unregistering): Released all slaves [ 3407.779754] bond1382 (unregistering): Releasing active interface bridge2471 [ 3407.862957] bond1382 (unregistering): Releasing active interface bridge2470 [ 3407.870101] device bridge2470 left promiscuous mode [ 3407.963508] bond1382 (unregistering): Released all slaves [ 3407.982217] bond1381 (unregistering): Releasing active interface bridge2469 [ 3408.062830] bond1381 (unregistering): Releasing active interface bridge2468 [ 3408.069977] device bridge2468 left promiscuous mode [ 3408.163516] bond1381 (unregistering): Released all slaves [ 3408.179532] bond1380 (unregistering): Releasing active interface bridge2467 [ 3408.263090] bond1380 (unregistering): Releasing active interface bridge2466 [ 3408.275856] device bridge2466 left promiscuous mode [ 3408.363546] bond1380 (unregistering): Released all slaves [ 3408.379728] bond1379 (unregistering): Releasing active interface bridge2465 [ 3408.462981] bond1379 (unregistering): Releasing active interface bridge2464 [ 3408.470127] device bridge2464 left promiscuous mode [ 3408.563554] bond1379 (unregistering): Released all slaves [ 3408.580464] bond1378 (unregistering): Releasing active interface bridge2463 [ 3408.662969] bond1378 (unregistering): Releasing active interface bridge2462 [ 3408.670120] device bridge2462 left promiscuous mode [ 3408.763411] bond1378 (unregistering): Released all slaves [ 3408.779005] bond1377 (unregistering): Releasing active interface bridge2461 [ 3408.872913] bond1377 (unregistering): Releasing active interface bridge2460 [ 3408.880060] device bridge2460 left promiscuous mode [ 3408.973591] bond1377 (unregistering): Released all slaves [ 3408.989374] bond1376 (unregistering): Releasing active interface bridge2459 [ 3409.006218] device bridge2459 left promiscuous mode [ 3409.094090] bond1376 (unregistering): Released all slaves [ 3409.110607] bond1375 (unregistering): Releasing active interface bridge2458 [ 3409.192852] bond1375 (unregistering): Releasing active interface bridge2457 [ 3409.199996] device bridge2457 left promiscuous mode [ 3409.293570] bond1375 (unregistering): Released all slaves [ 3409.309430] bond1374 (unregistering): Releasing active interface bridge2456 [ 3409.318114] device bridge2456 left promiscuous mode [ 3409.413506] bond1374 (unregistering): Released all slaves [ 3409.429617] bond1373 (unregistering): Releasing active interface bridge2455 [ 3409.512934] bond1373 (unregistering): Releasing active interface bridge2454 [ 3409.520185] device bridge2454 left promiscuous mode [ 3409.614226] bond1373 (unregistering): Released all slaves [ 3409.673908] bond1372 (unregistering): Released all slaves [ 3409.690181] bond1371 (unregistering): Releasing active interface bridge2452 [ 3409.697387] device bridge2452 left promiscuous mode [ 3409.793716] bond1371 (unregistering): Released all slaves [ 3409.811106] bond1370 (unregistering): Releasing active interface bridge2451 [ 3409.893128] bond1370 (unregistering): Releasing active interface bridge2450 [ 3409.905516] device bridge2450 left promiscuous mode [ 3409.993439] bond1370 (unregistering): Released all slaves [ 3410.010776] bond1369 (unregistering): Releasing active interface bridge2449 [ 3410.092827] bond1369 (unregistering): Releasing active interface bridge2448 [ 3410.099960] device bridge2448 left promiscuous mode [ 3410.193550] bond1369 (unregistering): Released all slaves [ 3410.210132] bond1368 (unregistering): Releasing active interface bridge2447 [ 3410.292878] bond1368 (unregistering): Releasing active interface bridge2446 [ 3410.300021] device bridge2446 left promiscuous mode [ 3410.394354] bond1368 (unregistering): Released all slaves [ 3410.410606] bond1367 (unregistering): Releasing active interface bridge2445 [ 3410.493137] bond1367 (unregistering): Releasing active interface bridge2444 [ 3410.505789] device bridge2444 left promiscuous mode [ 3410.593523] bond1367 (unregistering): Released all slaves [ 3410.656621] bond1366 (unregistering): Releasing active interface bridge2442 [ 3410.668437] device bridge2442 left promiscuous mode [ 3410.753641] bond1366 (unregistering): Released all slaves [ 3410.770588] bond1365 (unregistering): Releasing active interface bridge2441 [ 3410.852754] bond1365 (unregistering): Releasing active interface bridge2440 [ 3410.859907] device bridge2440 left promiscuous mode [ 3410.953609] bond1365 (unregistering): Released all slaves [ 3410.969948] bond1364 (unregistering): Releasing active interface bridge2439 [ 3411.052846] bond1364 (unregistering): Releasing active interface bridge2438 [ 3411.060009] device bridge2438 left promiscuous mode [ 3411.153666] bond1364 (unregistering): Released all slaves [ 3411.172925] bond1363 (unregistering): Releasing active interface bridge2437 [ 3411.252741] bond1363 (unregistering): Releasing active interface bridge2436 [ 3411.260020] device bridge2436 left promiscuous mode [ 3411.353736] bond1363 (unregistering): Released all slaves [ 3411.369895] bond1362 (unregistering): Releasing active interface bridge2435 [ 3411.452778] bond1362 (unregistering): Releasing active interface bridge2434 [ 3411.459925] device bridge2434 left promiscuous mode [ 3411.553578] bond1362 (unregistering): Released all slaves [ 3411.570664] bond1361 (unregistering): Releasing active interface bridge2433 [ 3411.652855] bond1361 (unregistering): Releasing active interface bridge2432 [ 3411.660010] device bridge2432 left promiscuous mode [ 3411.753749] bond1361 (unregistering): Released all slaves [ 3411.769855] bond1360 (unregistering): Releasing active interface bridge2431 [ 3411.853031] bond1360 (unregistering): Releasing active interface bridge2430 [ 3411.860182] device bridge2430 left promiscuous mode [ 3411.963855] bond1360 (unregistering): Released all slaves [ 3411.979853] bond1359 (unregistering): Releasing active interface bridge2429 [ 3412.062902] bond1359 (unregistering): Releasing active interface bridge2428 [ 3412.070051] device bridge2428 left promiscuous mode [ 3412.163695] bond1359 (unregistering): Released all slaves [ 3412.180112] bond1358 (unregistering): Releasing active interface bridge2427 [ 3412.262920] bond1358 (unregistering): Releasing active interface bridge2426 [ 3412.270075] device bridge2426 left promiscuous mode [ 3412.363641] bond1358 (unregistering): Released all slaves [ 3412.379928] bond1357 (unregistering): Releasing active interface bridge2425 [ 3412.462935] bond1357 (unregistering): Releasing active interface bridge2424 [ 3412.470089] device bridge2424 left promiscuous mode [ 3412.563583] bond1357 (unregistering): Released all slaves [ 3412.579454] bond1356 (unregistering): Releasing active interface bridge2423 [ 3412.586695] device bridge2423 left promiscuous mode [ 3412.683478] bond1356 (unregistering): Released all slaves [ 3412.699569] bond1355 (unregistering): Releasing active interface bridge2422 [ 3412.782913] bond1355 (unregistering): Releasing active interface bridge2421 [ 3412.790074] device bridge2421 left promiscuous mode [ 3412.883497] bond1355 (unregistering): Released all slaves [ 3412.899736] bond1354 (unregistering): Releasing active interface bridge2420 [ 3412.983011] bond1354 (unregistering): Releasing active interface bridge2419 [ 3412.990160] device bridge2419 left promiscuous mode [ 3413.083627] bond1354 (unregistering): Released all slaves [ 3413.100630] bond1353 (unregistering): Releasing active interface bridge2418 [ 3413.182892] bond1353 (unregistering): Releasing active interface bridge2417 [ 3413.190037] device bridge2417 left promiscuous mode [ 3413.283548] bond1353 (unregistering): Released all slaves [ 3413.299652] bond1352 (unregistering): Releasing active interface bridge2416 [ 3413.383760] bond1352 (unregistering): Releasing active interface bridge2415 [ 3413.396660] device bridge2415 left promiscuous mode [ 3413.483562] bond1352 (unregistering): Released all slaves [ 3413.499832] bond1351 (unregistering): Releasing active interface bridge2414 [ 3413.583073] bond1351 (unregistering): Releasing active interface bridge2413 [ 3413.595814] device bridge2413 left promiscuous mode [ 3413.683643] bond1351 (unregistering): Released all slaves [ 3413.699782] bond1350 (unregistering): Releasing active interface bridge2412 [ 3413.782870] bond1350 (unregistering): Releasing active interface bridge2411 [ 3413.790022] device bridge2411 left promiscuous mode [ 3413.883562] bond1350 (unregistering): Released all slaves [ 3413.943915] bond1349 (unregistering): Released all slaves [ 3413.962763] bond1348 (unregistering): Releasing active interface bridge2409 [ 3413.969909] device bridge2409 left promiscuous mode [ 3414.063724] bond1348 (unregistering): Released all slaves [ 3414.123070] bond1347 (unregistering): Releasing active interface bridge2407 [ 3414.135785] device bridge2407 left promiscuous mode [ 3414.223569] bond1347 (unregistering): Released all slaves [ 3414.234342] bond1346 (unregistering): Releasing active interface bridge2406 [ 3414.323065] bond1346 (unregistering): Releasing active interface bridge2405 [ 3414.335766] device bridge2405 left promiscuous mode [ 3414.424475] bond1346 (unregistering): Released all slaves [ 3414.444600] bond1345 (unregistering): Releasing active interface bridge2404 [ 3414.543090] bond1345 (unregistering): Releasing active interface bridge2403 [ 3414.556422] device bridge2403 left promiscuous mode [ 3414.645605] bond1345 (unregistering): Released all slaves [ 3414.661756] bond1344 (unregistering): Releasing active interface bridge2402 [ 3414.742970] bond1344 (unregistering): Releasing active interface bridge2401 [ 3414.750124] device bridge2401 left promiscuous mode [ 3414.843582] bond1344 (unregistering): Released all slaves [ 3414.859629] bond1343 (unregistering): Releasing active interface bridge2400 [ 3414.944113] bond1343 (unregistering): Releasing active interface bridge2399 [ 3414.956854] device bridge2399 left promiscuous mode [ 3415.043856] bond1343 (unregistering): Released all slaves [ 3415.060397] bond1342 (unregistering): Releasing active interface bridge2398 [ 3415.142903] bond1342 (unregistering): Releasing active interface bridge2397 [ 3415.150050] device bridge2397 left promiscuous mode [ 3415.243388] bond1342 (unregistering): Released all slaves [ 3415.259365] bond1341 (unregistering): Releasing active interface bridge2396 [ 3415.342938] bond1341 (unregistering): Releasing active interface bridge2395 [ 3415.350106] device bridge2395 left promiscuous mode [ 3415.443580] bond1341 (unregistering): Released all slaves [ 3415.459491] bond1340 (unregistering): Releasing active interface bridge2394 [ 3415.543104] bond1340 (unregistering): Releasing active interface bridge2393 [ 3415.555807] device bridge2393 left promiscuous mode [ 3415.643591] bond1340 (unregistering): Released all slaves [ 3415.703786] bond1339 (unregistering): Released all slaves [ 3415.723457] bond1338 (unregistering): Releasing active interface bridge2391 [ 3415.736832] device bridge2391 left promiscuous mode [ 3415.823707] bond1338 (unregistering): Released all slaves [ 3415.840057] bond1337 (unregistering): Releasing active interface bridge2390 [ 3415.924878] bond1337 (unregistering): Releasing active interface bridge2389 [ 3415.937425] device bridge2389 left promiscuous mode [ 3416.023597] bond1337 (unregistering): Released all slaves [ 3416.042039] bond1336 (unregistering): Releasing active interface bridge2388 [ 3416.122992] bond1336 (unregistering): Releasing active interface bridge2387 [ 3416.130147] device bridge2387 left promiscuous mode [ 3416.223639] bond1336 (unregistering): Released all slaves [ 3416.239881] bond1335 (unregistering): Releasing active interface bridge2386 [ 3416.322945] bond1335 (unregistering): Releasing active interface bridge2385 [ 3416.330095] device bridge2385 left promiscuous mode [ 3416.423597] bond1335 (unregistering): Released all slaves [ 3416.483293] bond1334 (unregistering): Releasing active interface bridge2383 [ 3416.495909] device bridge2383 left promiscuous mode [ 3416.583779] bond1334 (unregistering): Released all slaves [ 3416.600200] bond1333 (unregistering): Releasing active interface bridge2382 [ 3416.682887] bond1333 (unregistering): Releasing active interface bridge2381 [ 3416.690039] device bridge2381 left promiscuous mode [ 3416.783566] bond1333 (unregistering): Released all slaves [ 3416.799979] bond1332 (unregistering): Releasing active interface bridge2380 [ 3416.883043] bond1332 (unregistering): Releasing active interface bridge2379 [ 3416.896598] device bridge2379 left promiscuous mode [ 3416.983648] bond1332 (unregistering): Released all slaves [ 3417.012932] bond1331 (unregistering): Releasing active interface bridge2378 [ 3417.020097] device bridge2378 left promiscuous mode [ 3417.103633] bond1331 (unregistering): Released all slaves [ 3417.119783] bond1330 (unregistering): Releasing active interface bridge2377 [ 3417.213148] bond1330 (unregistering): Releasing active interface bridge2376 [ 3417.225902] device bridge2376 left promiscuous mode [ 3417.313629] bond1330 (unregistering): Released all slaves [ 3417.333681] bond1329 (unregistering): Releasing active interface bridge2375 [ 3417.442896] bond1329 (unregistering): Releasing active interface bridge2374 [ 3417.450030] device bridge2374 left promiscuous mode [ 3417.543435] bond1329 (unregistering): Released all slaves [ 3417.560374] bond1328 (unregistering): Releasing active interface bridge2373 [ 3417.642836] bond1328 (unregistering): Releasing active interface bridge2372 [ 3417.649977] device bridge2372 left promiscuous mode [ 3417.743542] bond1328 (unregistering): Released all slaves [ 3417.759565] bond1327 (unregistering): Releasing active interface bridge2371 [ 3417.843104] bond1327 (unregistering): Releasing active interface bridge2370 [ 3417.855589] device bridge2370 left promiscuous mode [ 3417.943987] bond1327 (unregistering): Released all slaves [ 3417.965889] bond1326 (unregistering): Releasing active interface bridge2369 [ 3418.062849] bond1326 (unregistering): Releasing active interface bridge2368 [ 3418.069976] device bridge2368 left promiscuous mode [ 3418.165533] bond1326 (unregistering): Released all slaves [ 3418.181565] bond1325 (unregistering): Releasing active interface bridge2367 [ 3418.263129] bond1325 (unregistering): Releasing active interface bridge2366 [ 3418.277667] device bridge2366 left promiscuous mode [ 3418.363249] bond1325 (unregistering): Released all slaves [ 3418.379020] bond1324 (unregistering): Releasing active interface bridge2365 [ 3418.386238] device bridge2365 left promiscuous mode [ 3418.463343] bond1324 (unregistering): Released all slaves [ 3418.523641] bond1323 (unregistering): Released all slaves [ 3418.539887] bond1322 (unregistering): Releasing active interface bridge2363 [ 3418.547088] device bridge2363 left promiscuous mode [ 3418.644248] bond1322 (unregistering): Released all slaves [ 3418.660647] bond1321 (unregistering): Releasing active interface bridge2362 [ 3418.743728] bond1321 (unregistering): Releasing active interface bridge2361 [ 3418.757279] device bridge2361 left promiscuous mode [ 3418.843431] bond1321 (unregistering): Released all slaves [ 3418.860430] bond1320 (unregistering): Releasing active interface bridge2360 [ 3418.942979] bond1320 (unregistering): Releasing active interface bridge2359 [ 3418.950135] device bridge2359 left promiscuous mode [ 3419.043504] bond1320 (unregistering): Released all slaves [ 3419.103883] bond1319 (unregistering): Releasing active interface bridge2357 [ 3419.116561] device bridge2357 left promiscuous mode [ 3419.203776] bond1319 (unregistering): Released all slaves [ 3419.220138] bond1318 (unregistering): Releasing active interface bridge2356 [ 3419.302862] bond1318 (unregistering): Releasing active interface bridge2355 [ 3419.310010] device bridge2355 left promiscuous mode [ 3419.405013] bond1318 (unregistering): Released all slaves [ 3419.420762] bond1317 (unregistering): Releasing active interface bridge2354 [ 3419.502852] bond1317 (unregistering): Releasing active interface bridge2353 [ 3419.510001] device bridge2353 left promiscuous mode [ 3419.603428] bond1317 (unregistering): Released all slaves [ 3419.619484] bond1316 (unregistering): Releasing active interface bridge2352 [ 3419.702888] bond1316 (unregistering): Releasing active interface bridge2351 [ 3419.710049] device bridge2351 left promiscuous mode [ 3419.803557] bond1316 (unregistering): Released all slaves [ 3419.815025] bond1315 (unregistering): Releasing active interface bridge2350 [ 3419.903019] bond1315 (unregistering): Releasing active interface bridge2349 [ 3419.910186] device bridge2349 left promiscuous mode [ 3420.003510] bond1315 (unregistering): Released all slaves [ 3420.020522] bond1314 (unregistering): Releasing active interface bridge2348 [ 3420.102863] bond1314 (unregistering): Releasing active interface bridge2347 [ 3420.110010] device bridge2347 left promiscuous mode [ 3420.203291] bond1314 (unregistering): Released all slaves [ 3420.215087] bond1313 (unregistering): Releasing active interface bridge2346 [ 3420.302912] bond1313 (unregistering): Releasing active interface bridge2345 [ 3420.310068] device bridge2345 left promiscuous mode [ 3420.404224] bond1313 (unregistering): Released all slaves [ 3420.420473] bond1312 (unregistering): Releasing active interface bridge2344 [ 3420.502898] bond1312 (unregistering): Releasing active interface bridge2343 [ 3420.510043] device bridge2343 left promiscuous mode [ 3420.603455] bond1312 (unregistering): Released all slaves [ 3420.619327] bond1311 (unregistering): Releasing active interface bridge2342 [ 3420.702882] bond1311 (unregistering): Releasing active interface bridge2341 [ 3420.710040] device bridge2341 left promiscuous mode [ 3420.805808] bond1311 (unregistering): Released all slaves [ 3420.822568] bond1310 (unregistering): Releasing active interface bridge2340 [ 3420.903080] bond1310 (unregistering): Releasing active interface bridge2339 [ 3420.915670] device bridge2339 left promiscuous mode [ 3421.003170] bond1310 (unregistering): Released all slaves [ 3421.019276] bond1309 (unregistering): Releasing active interface bridge2338 [ 3421.102961] bond1309 (unregistering): Releasing active interface bridge2337 [ 3421.110116] device bridge2337 left promiscuous mode [ 3421.203659] bond1309 (unregistering): Released all slaves [ 3421.263238] bond1308 (unregistering): Releasing active interface bridge2335 [ 3421.275779] device bridge2335 left promiscuous mode [ 3421.363411] bond1308 (unregistering): Released all slaves [ 3421.423021] bond1307 (unregistering): Releasing active interface bridge2333 [ 3421.430160] device bridge2333 left promiscuous mode [ 3421.523398] bond1307 (unregistering): Released all slaves [ 3421.539305] bond1306 (unregistering): Releasing active interface bridge2332 [ 3421.623406] bond1306 (unregistering): Releasing active interface bridge2331 [ 3421.635968] device bridge2331 left promiscuous mode [ 3421.723517] bond1306 (unregistering): Released all slaves [ 3421.740374] bond1305 (unregistering): Releasing active interface bridge2330 [ 3421.822916] bond1305 (unregistering): Releasing active interface bridge2329 [ 3421.830076] device bridge2329 left promiscuous mode [ 3421.923622] bond1305 (unregistering): Released all slaves [ 3421.939919] bond1304 (unregistering): Releasing active interface bridge2328 [ 3422.023011] bond1304 (unregistering): Releasing active interface bridge2327 [ 3422.030172] device bridge2327 left promiscuous mode [ 3422.125177] bond1304 (unregistering): Released all slaves [ 3422.141271] bond1303 (unregistering): Releasing active interface bridge2326 [ 3422.223697] bond1303 (unregistering): Releasing active interface bridge2325 [ 3422.236307] device bridge2325 left promiscuous mode [ 3422.323451] bond1303 (unregistering): Released all slaves [ 3422.339556] bond1302 (unregistering): Releasing active interface bridge2324 [ 3422.433000] bond1302 (unregistering): Releasing active interface bridge2323 [ 3422.440155] device bridge2323 left promiscuous mode [ 3422.533550] bond1302 (unregistering): Released all slaves [ 3422.549626] bond1301 (unregistering): Releasing active interface bridge2322 [ 3422.632861] bond1301 (unregistering): Releasing active interface bridge2321 [ 3422.640027] device bridge2321 left promiscuous mode [ 3422.744310] bond1301 (unregistering): Released all slaves [ 3422.761137] bond1300 (unregistering): Releasing active interface bridge2320 [ 3422.842838] bond1300 (unregistering): Releasing active interface bridge2319 [ 3422.850011] device bridge2319 left promiscuous mode [ 3422.943389] bond1300 (unregistering): Released all slaves [ 3422.959744] bond1299 (unregistering): Releasing active interface bridge2318 [ 3423.042881] bond1299 (unregistering): Releasing active interface bridge2317 [ 3423.050042] device bridge2317 left promiscuous mode [ 3423.143063] bond1299 (unregistering): Released all slaves [ 3423.158613] bond1298 (unregistering): Releasing active interface bridge2316 [ 3423.242820] bond1298 (unregistering): Releasing active interface bridge2315 [ 3423.249975] device bridge2315 left promiscuous mode [ 3423.343276] bond1298 (unregistering): Released all slaves [ 3423.402935] bond1297 (unregistering): Releasing active interface bridge2313 [ 3423.410077] device bridge2313 left promiscuous mode [ 3423.505321] bond1297 (unregistering): Released all slaves [ 3423.521751] bond1296 (unregistering): Releasing active interface bridge2312 [ 3423.602798] bond1296 (unregistering): Releasing active interface bridge2311 [ 3423.609956] device bridge2311 left promiscuous mode [ 3423.703388] bond1296 (unregistering): Released all slaves [ 3423.719748] bond1295 (unregistering): Releasing active interface bridge2310 [ 3423.802863] bond1295 (unregistering): Releasing active interface bridge2309 [ 3423.810014] device bridge2309 left promiscuous mode [ 3423.903465] bond1295 (unregistering): Released all slaves [ 3423.963592] bond1294 (unregistering): Released all slaves [ 3423.979719] bond1293 (unregistering): Releasing active interface bridge2307 [ 3423.986899] device bridge2307 left promiscuous mode [ 3424.083362] bond1293 (unregistering): Released all slaves [ 3424.143777] bond1292 (unregistering): Released all slaves [ 3424.160002] bond1291 (unregistering): Releasing active interface bridge2305 [ 3424.167201] device bridge2305 left promiscuous mode [ 3424.263344] bond1291 (unregistering): Released all slaves [ 3424.280291] bond1290 (unregistering): Releasing active interface bridge2304 [ 3424.362602] bond1290 (unregistering): Releasing active interface bridge2303 [ 3424.369741] device bridge2303 left promiscuous mode [ 3424.463313] bond1290 (unregistering): Released all slaves [ 3424.478873] bond1289 (unregistering): Releasing active interface bridge2302 [ 3424.563860] bond1289 (unregistering): Releasing active interface bridge2301 [ 3424.576456] device bridge2301 left promiscuous mode [ 3424.663458] bond1289 (unregistering): Released all slaves [ 3424.684884] bond1288 (unregistering): Releasing active interface bridge2300 [ 3424.782861] bond1288 (unregistering): Releasing active interface bridge2299 [ 3424.790002] device bridge2299 left promiscuous mode [ 3424.883425] bond1288 (unregistering): Released all slaves [ 3424.899827] bond1287 (unregistering): Releasing active interface bridge2298 [ 3424.983076] bond1287 (unregistering): Releasing active interface bridge2297 [ 3424.996723] device bridge2297 left promiscuous mode [ 3425.084128] bond1287 (unregistering): Released all slaves [ 3425.099674] bond1286 (unregistering): Releasing active interface bridge2296 [ 3425.182796] bond1286 (unregistering): Releasing active interface bridge2295 [ 3425.189947] device bridge2295 left promiscuous mode [ 3425.283178] bond1286 (unregistering): Released all slaves [ 3425.299575] bond1285 (unregistering): Releasing active interface bridge2294 [ 3425.382786] bond1285 (unregistering): Releasing active interface bridge2293 [ 3425.390038] device bridge2293 left promiscuous mode [ 3425.483476] bond1285 (unregistering): Released all slaves [ 3425.499597] bond1284 (unregistering): Releasing active interface bridge2292 [ 3425.582749] bond1284 (unregistering): Releasing active interface bridge2291 [ 3425.589894] device bridge2291 left promiscuous mode [ 3425.683400] bond1284 (unregistering): Released all slaves [ 3425.699407] bond1283 (unregistering): Releasing active interface bridge2290 [ 3425.782879] bond1283 (unregistering): Releasing active interface bridge2289 [ 3425.790031] device bridge2289 left promiscuous mode [ 3425.883579] bond1283 (unregistering): Released all slaves [ 3425.899966] bond1282 (unregistering): Releasing active interface bridge2288 [ 3425.982804] bond1282 (unregistering): Releasing active interface bridge2287 [ 3425.989967] device bridge2287 left promiscuous mode [ 3426.083417] bond1282 (unregistering): Released all slaves [ 3426.099396] bond1281 (unregistering): Releasing active interface bridge2286 [ 3426.182824] bond1281 (unregistering): Releasing active interface bridge2285 [ 3426.189967] device bridge2285 left promiscuous mode [ 3426.283388] bond1281 (unregistering): Released all slaves [ 3426.343150] bond1280 (unregistering): Releasing active interface bridge2283 [ 3426.356509] device bridge2283 left promiscuous mode [ 3426.443304] bond1280 (unregistering): Released all slaves [ 3426.459461] bond1279 (unregistering): Releasing active interface bridge2282 [ 3426.542916] bond1279 (unregistering): Releasing active interface bridge2281 [ 3426.550063] device bridge2281 left promiscuous mode [ 3426.644168] bond1279 (unregistering): Released all slaves [ 3426.659866] bond1278 (unregistering): Releasing active interface bridge2280 [ 3426.742842] bond1278 (unregistering): Releasing active interface bridge2279 [ 3426.749991] device bridge2279 left promiscuous mode [ 3426.843525] bond1278 (unregistering): Released all slaves [ 3426.904409] bond1277 (unregistering): Released all slaves [ 3426.920483] bond1276 (unregistering): Releasing active interface bridge2277 [ 3426.927620] device bridge2277 left promiscuous mode [ 3427.023535] bond1276 (unregistering): Released all slaves [ 3427.083200] bond1275 (unregistering): Releasing active interface bridge2275 [ 3427.095717] device bridge2275 left promiscuous mode [ 3427.183332] bond1275 (unregistering): Released all slaves [ 3427.199449] bond1274 (unregistering): Releasing active interface bridge2274 [ 3427.284463] bond1274 (unregistering): Releasing active interface bridge2273 [ 3427.298166] device bridge2273 left promiscuous mode [ 3427.383294] bond1274 (unregistering): Released all slaves [ 3427.400132] bond1273 (unregistering): Releasing active interface bridge2272 [ 3427.482634] bond1273 (unregistering): Releasing active interface bridge2271 [ 3427.489781] device bridge2271 left promiscuous mode [ 3427.583334] bond1273 (unregistering): Released all slaves [ 3427.599297] bond1272 (unregistering): Releasing active interface bridge2270 [ 3427.683828] bond1272 (unregistering): Releasing active interface bridge2269 [ 3427.696360] device bridge2269 left promiscuous mode [ 3427.793533] bond1272 (unregistering): Released all slaves [ 3427.812780] bond1271 (unregistering): Releasing active interface bridge2268 [ 3427.892920] bond1271 (unregistering): Releasing active interface bridge2267 [ 3427.900082] device bridge2267 left promiscuous mode [ 3427.993335] bond1271 (unregistering): Released all slaves [ 3428.009049] bond1270 (unregistering): Releasing active interface bridge2266 [ 3428.092885] bond1270 (unregistering): Releasing active interface bridge2265 [ 3428.100053] device bridge2265 left promiscuous mode [ 3428.193476] bond1270 (unregistering): Released all slaves [ 3428.210630] bond1269 (unregistering): Releasing active interface bridge2264 [ 3428.292800] bond1269 (unregistering): Releasing active interface bridge2263 [ 3428.299961] device bridge2263 left promiscuous mode [ 3428.393379] bond1269 (unregistering): Released all slaves [ 3428.409391] bond1268 (unregistering): Releasing active interface bridge2262 [ 3428.492875] bond1268 (unregistering): Releasing active interface bridge2261 [ 3428.500040] device bridge2261 left promiscuous mode [ 3428.594343] bond1268 (unregistering): Released all slaves [ 3428.611398] bond1267 (unregistering): Releasing active interface bridge2260 [ 3428.692836] bond1267 (unregistering): Releasing active interface bridge2259 [ 3428.699994] device bridge2259 left promiscuous mode [ 3428.793409] bond1267 (unregistering): Released all slaves [ 3428.853671] bond1266 (unregistering): Releasing active interface bridge2257 [ 3428.866088] device bridge2257 left promiscuous mode [ 3428.953400] bond1266 (unregistering): Released all slaves [ 3428.969403] bond1265 (unregistering): Releasing active interface bridge2256 [ 3429.052890] bond1265 (unregistering): Releasing active interface bridge2255 [ 3429.060035] device bridge2255 left promiscuous mode [ 3429.153449] bond1265 (unregistering): Released all slaves [ 3429.170633] bond1264 (unregistering): Releasing active interface bridge2254 [ 3429.177781] device bridge2254 left promiscuous mode [ 3429.273526] bond1264 (unregistering): Released all slaves [ 3429.333250] bond1263 (unregistering): Releasing active interface bridge2252 [ 3429.345800] device bridge2252 left promiscuous mode [ 3429.433416] bond1263 (unregistering): Released all slaves [ 3429.449788] bond1262 (unregistering): Releasing active interface bridge2251 [ 3429.532853] bond1262 (unregistering): Releasing active interface bridge2250 [ 3429.540003] device bridge2250 left promiscuous mode [ 3429.634248] bond1262 (unregistering): Released all slaves [ 3429.653065] bond1261 (unregistering): Releasing active interface bridge2249 [ 3429.742920] bond1261 (unregistering): Releasing active interface bridge2248 [ 3429.750088] device bridge2248 left promiscuous mode [ 3429.843383] bond1261 (unregistering): Released all slaves [ 3429.859241] bond1260 (unregistering): Releasing active interface bridge2247 [ 3429.942889] bond1260 (unregistering): Releasing active interface bridge2246 [ 3429.950051] device bridge2246 left promiscuous mode [ 3430.053441] bond1260 (unregistering): Released all slaves [ 3430.069661] bond1259 (unregistering): Releasing active interface bridge2245 [ 3430.153740] bond1259 (unregistering): Releasing active interface bridge2244 [ 3430.166720] device bridge2244 left promiscuous mode [ 3430.253363] bond1259 (unregistering): Released all slaves [ 3430.269268] bond1258 (unregistering): Releasing active interface bridge2243 [ 3430.352937] bond1258 (unregistering): Releasing active interface bridge2242 [ 3430.360092] device bridge2242 left promiscuous mode [ 3430.453409] bond1258 (unregistering): Released all slaves [ 3430.469408] bond1257 (unregistering): Releasing active interface bridge2241 [ 3430.552768] bond1257 (unregistering): Releasing active interface bridge2240 [ 3430.559924] device bridge2240 left promiscuous mode [ 3430.653490] bond1257 (unregistering): Released all slaves [ 3430.669277] bond1256 (unregistering): Releasing active interface bridge2239 [ 3430.752906] bond1256 (unregistering): Releasing active interface bridge2238 [ 3430.760056] device bridge2238 left promiscuous mode [ 3430.853167] bond1256 (unregistering): Released all slaves [ 3430.868892] bond1255 (unregistering): Releasing active interface bridge2237 [ 3430.953348] bond1255 (unregistering): Releasing active interface bridge2236 [ 3430.965961] device bridge2236 left promiscuous mode [ 3431.053490] bond1255 (unregistering): Released all slaves [ 3431.071119] bond1254 (unregistering): Releasing active interface bridge2235 [ 3431.152879] bond1254 (unregistering): Releasing active interface bridge2234 [ 3431.160031] device bridge2234 left promiscuous mode [ 3431.253480] bond1254 (unregistering): Released all slaves [ 3431.269673] bond1253 (unregistering): Releasing active interface bridge2233 [ 3431.352794] bond1253 (unregistering): Releasing active interface bridge2232 [ 3431.359943] device bridge2232 left promiscuous mode [ 3431.454155] bond1253 (unregistering): Released all slaves [ 3431.470015] bond1252 (unregistering): Releasing active interface bridge2231 [ 3431.553060] bond1252 (unregistering): Releasing active interface bridge2230 [ 3431.568163] device bridge2230 left promiscuous mode [ 3431.653330] bond1252 (unregistering): Released all slaves [ 3431.669101] bond1251 (unregistering): Releasing active interface bridge2229 [ 3431.752784] bond1251 (unregistering): Releasing active interface bridge2228 [ 3431.759936] device bridge2228 left promiscuous mode [ 3431.853389] bond1251 (unregistering): Released all slaves [ 3431.869090] bond1250 (unregistering): Releasing active interface bridge2227 [ 3431.952876] bond1250 (unregistering): Releasing active interface bridge2226 [ 3431.960025] device bridge2226 left promiscuous mode [ 3432.053352] bond1250 (unregistering): Released all slaves [ 3432.069492] bond1249 (unregistering): Releasing active interface bridge2225 [ 3432.152929] bond1249 (unregistering): Releasing active interface bridge2224 [ 3432.160076] device bridge2224 left promiscuous mode [ 3432.263541] bond1249 (unregistering): Released all slaves [ 3432.281272] bond1248 (unregistering): Releasing active interface bridge2223 [ 3432.362909] bond1248 (unregistering): Releasing active interface bridge2222 [ 3432.370058] device bridge2222 left promiscuous mode [ 3432.463398] bond1248 (unregistering): Released all slaves [ 3432.479479] bond1247 (unregistering): Releasing active interface bridge2221 [ 3432.562930] bond1247 (unregistering): Releasing active interface bridge2220 [ 3432.570078] device bridge2220 left promiscuous mode [ 3432.663681] bond1247 (unregistering): Released all slaves [ 3432.683017] bond1246 (unregistering): Releasing active interface bridge2219 [ 3432.764783] bond1246 (unregistering): Releasing active interface bridge2218 [ 3432.778142] device bridge2218 left promiscuous mode [ 3432.863464] bond1246 (unregistering): Released all slaves [ 3432.879939] bond1245 (unregistering): Releasing active interface bridge2217 [ 3432.963084] bond1245 (unregistering): Releasing active interface bridge2216 [ 3432.975639] device bridge2216 left promiscuous mode [ 3433.063489] bond1245 (unregistering): Released all slaves [ 3433.081210] bond1244 (unregistering): Releasing active interface bridge2215 [ 3433.162965] bond1244 (unregistering): Releasing active interface bridge2214 [ 3433.170130] device bridge2214 left promiscuous mode [ 3433.263470] bond1244 (unregistering): Released all slaves [ 3433.280072] bond1243 (unregistering): Releasing active interface bridge2213 [ 3433.362901] bond1243 (unregistering): Releasing active interface bridge2212 [ 3433.370148] device bridge2212 left promiscuous mode [ 3433.473432] bond1243 (unregistering): Released all slaves [ 3433.492076] bond1242 (unregistering): Releasing active interface bridge2211 [ 3433.572844] bond1242 (unregistering): Releasing active interface bridge2210 [ 3433.579994] device bridge2210 left promiscuous mode [ 3433.673557] bond1242 (unregistering): Released all slaves [ 3433.690168] bond1241 (unregistering): Releasing active interface bridge2209 [ 3433.772812] bond1241 (unregistering): Releasing active interface bridge2208 [ 3433.779963] device bridge2208 left promiscuous mode [ 3433.873356] bond1241 (unregistering): Released all slaves [ 3433.890378] bond1240 (unregistering): Releasing active interface bridge2207 [ 3433.973445] bond1240 (unregistering): Releasing active interface bridge2206 [ 3433.986076] device bridge2206 left promiscuous mode [ 3434.073449] bond1240 (unregistering): Released all slaves [ 3434.089579] bond1239 (unregistering): Releasing active interface bridge2205 [ 3434.174665] bond1239 (unregistering): Releasing active interface bridge2204 [ 3434.187019] device bridge2204 left promiscuous mode [ 3434.274009] bond1239 (unregistering): Released all slaves [ 3434.289897] bond1238 (unregistering): Releasing active interface bridge2203 [ 3434.372977] bond1238 (unregistering): Releasing active interface bridge2202 [ 3434.380131] device bridge2202 left promiscuous mode [ 3434.473475] bond1238 (unregistering): Released all slaves [ 3434.489734] bond1237 (unregistering): Releasing active interface bridge2201 [ 3434.574075] bond1237 (unregistering): Releasing active interface bridge2200 [ 3434.586762] device bridge2200 left promiscuous mode [ 3434.673998] bond1237 (unregistering): Released all slaves [ 3434.693982] bond1236 (unregistering): Releasing active interface bridge2199 [ 3434.802865] bond1236 (unregistering): Releasing active interface bridge2198 [ 3434.810017] device bridge2198 left promiscuous mode [ 3434.903515] bond1236 (unregistering): Released all slaves [ 3434.921713] bond1235 (unregistering): Releasing active interface bridge2197 [ 3435.002710] bond1235 (unregistering): Releasing active interface bridge2196 [ 3435.009861] device bridge2196 left promiscuous mode [ 3435.103295] bond1235 (unregistering): Released all slaves [ 3435.114613] bond1234 (unregistering): Releasing active interface bridge2195 [ 3435.126191] device bridge2195 left promiscuous mode [ 3435.223255] bond1234 (unregistering): Released all slaves [ 3435.283000] bond1233 (unregistering): Releasing active interface bridge2193 [ 3435.290137] device bridge2193 left promiscuous mode [ 3435.383261] bond1233 (unregistering): Released all slaves [ 3435.400184] bond1232 (unregistering): Releasing active interface bridge2192 [ 3435.483071] bond1232 (unregistering): Releasing active interface bridge2191 [ 3435.495584] device bridge2191 left promiscuous mode [ 3435.585415] bond1232 (unregistering): Released all slaves [ 3435.602348] bond1231 (unregistering): Releasing active interface bridge2190 [ 3435.682889] bond1231 (unregistering): Releasing active interface bridge2189 [ 3435.690041] device bridge2189 left promiscuous mode [ 3435.783482] bond1231 (unregistering): Released all slaves [ 3435.801407] bond1230 (unregistering): Releasing active interface bridge2188 [ 3435.882827] bond1230 (unregistering): Releasing active interface bridge2187 [ 3435.889977] device bridge2187 left promiscuous mode [ 3435.983295] bond1230 (unregistering): Released all slaves [ 3435.999956] bond1229 (unregistering): Releasing active interface bridge2186 [ 3436.092733] bond1229 (unregistering): Releasing active interface bridge2185 [ 3436.099878] device bridge2185 left promiscuous mode [ 3436.193752] bond1229 (unregistering): Released all slaves [ 3436.207060] bond1228 (unregistering): Releasing active interface bridge2184 [ 3436.293007] bond1228 (unregistering): Releasing active interface bridge2183 [ 3436.300161] device bridge2183 left promiscuous mode [ 3436.393486] bond1228 (unregistering): Released all slaves [ 3436.453541] bond1227 (unregistering): Released all slaves [ 3436.469546] bond1226 (unregistering): Releasing active interface bridge2181 [ 3436.476758] device bridge2181 left promiscuous mode [ 3436.573424] bond1226 (unregistering): Released all slaves [ 3436.589255] bond1225 (unregistering): Releasing active interface bridge2180 [ 3436.682935] bond1225 (unregistering): Releasing active interface bridge2179 [ 3436.690098] device bridge2179 left promiscuous mode [ 3436.783397] bond1225 (unregistering): Released all slaves [ 3436.799682] bond1224 (unregistering): Releasing active interface bridge2178 [ 3436.882894] bond1224 (unregistering): Releasing active interface bridge2177 [ 3436.890197] device bridge2177 left promiscuous mode [ 3436.983437] bond1224 (unregistering): Released all slaves [ 3437.000681] bond1223 (unregistering): Releasing active interface bridge2176 [ 3437.082480] bond1223 (unregistering): Releasing active interface bridge2175 [ 3437.089715] device bridge2175 left promiscuous mode [ 3437.183558] bond1223 (unregistering): Released all slaves [ 3437.243040] bond1222 (unregistering): Releasing active interface bridge2173 [ 3437.250190] device bridge2173 left promiscuous mode [ 3437.343706] bond1222 (unregistering): Released all slaves [ 3437.359983] bond1221 (unregistering): Releasing active interface bridge2172 [ 3437.443130] bond1221 (unregistering): Releasing active interface bridge2171 [ 3437.455755] device bridge2171 left promiscuous mode [ 3437.543400] bond1221 (unregistering): Released all slaves [ 3437.560328] bond1220 (unregistering): Releasing active interface bridge2170 [ 3437.642978] bond1220 (unregistering): Releasing active interface bridge2169 [ 3437.650132] device bridge2169 left promiscuous mode [ 3437.743488] bond1220 (unregistering): Released all slaves [ 3437.759586] bond1219 (unregistering): Releasing active interface bridge2168 [ 3437.842841] bond1219 (unregistering): Releasing active interface bridge2167 [ 3437.849994] device bridge2167 left promiscuous mode [ 3437.944232] bond1219 (unregistering): Released all slaves [ 3437.962294] bond1218 (unregistering): Releasing active interface bridge2166 [ 3438.042896] bond1218 (unregistering): Releasing active interface bridge2165 [ 3438.050060] device bridge2165 left promiscuous mode [ 3438.143540] bond1218 (unregistering): Released all slaves [ 3438.159492] bond1217 (unregistering): Releasing active interface bridge2164 [ 3438.252976] bond1217 (unregistering): Releasing active interface bridge2163 [ 3438.260140] device bridge2163 left promiscuous mode [ 3438.353660] bond1217 (unregistering): Released all slaves [ 3438.369664] bond1216 (unregistering): Releasing active interface bridge2162 [ 3438.452843] bond1216 (unregistering): Releasing active interface bridge2161 [ 3438.459997] device bridge2161 left promiscuous mode [ 3438.553511] bond1216 (unregistering): Released all slaves [ 3438.569614] bond1215 (unregistering): Releasing active interface bridge2160 [ 3438.652715] bond1215 (unregistering): Releasing active interface bridge2159 [ 3438.659855] device bridge2159 left promiscuous mode [ 3438.753490] bond1215 (unregistering): Released all slaves [ 3438.769831] bond1214 (unregistering): Releasing active interface bridge2158 [ 3438.853692] bond1214 (unregistering): Releasing active interface bridge2157 [ 3438.866294] device bridge2157 left promiscuous mode [ 3438.953440] bond1214 (unregistering): Released all slaves [ 3438.969467] bond1213 (unregistering): Releasing active interface bridge2156 [ 3439.053082] bond1213 (unregistering): Releasing active interface bridge2155 [ 3439.065720] device bridge2155 left promiscuous mode [ 3439.153464] bond1213 (unregistering): Released all slaves [ 3439.173184] bond1212 (unregistering): Releasing active interface bridge2154 [ 3439.282887] bond1212 (unregistering): Releasing active interface bridge2153 [ 3439.290037] device bridge2153 left promiscuous mode [ 3439.383462] bond1212 (unregistering): Released all slaves [ 3439.399513] bond1211 (unregistering): Releasing active interface bridge2152 [ 3439.483127] bond1211 (unregistering): Releasing active interface bridge2151 [ 3439.497596] device bridge2151 left promiscuous mode [ 3439.583555] bond1211 (unregistering): Released all slaves [ 3439.600058] bond1210 (unregistering): Releasing active interface bridge2150 [ 3439.682815] bond1210 (unregistering): Releasing active interface bridge2149 [ 3439.689979] device bridge2149 left promiscuous mode [ 3439.783538] bond1210 (unregistering): Released all slaves [ 3439.800293] bond1209 (unregistering): Releasing active interface bridge2148 [ 3439.882776] bond1209 (unregistering): Releasing active interface bridge2147 [ 3439.897316] device bridge2147 left promiscuous mode [ 3439.983510] bond1209 (unregistering): Released all slaves [ 3439.999921] bond1208 (unregistering): Releasing active interface bridge2146 [ 3440.082913] bond1208 (unregistering): Releasing active interface bridge2145 [ 3440.095680] device bridge2145 left promiscuous mode [ 3440.183390] bond1208 (unregistering): Released all slaves [ 3440.203746] bond1207 (unregistering): Releasing active interface bridge2144 [ 3440.302769] bond1207 (unregistering): Releasing active interface bridge2143 [ 3440.310003] device bridge2143 left promiscuous mode [ 3440.403533] bond1207 (unregistering): Released all slaves [ 3440.420645] bond1206 (unregistering): Releasing active interface bridge2142 [ 3440.502746] bond1206 (unregistering): Releasing active interface bridge2141 [ 3440.509897] device bridge2141 left promiscuous mode [ 3440.603517] bond1206 (unregistering): Released all slaves [ 3440.619039] bond1205 (unregistering): Releasing active interface bridge2140 [ 3440.702796] bond1205 (unregistering): Releasing active interface bridge2139 [ 3440.709949] device bridge2139 left promiscuous mode [ 3440.804310] bond1205 (unregistering): Released all slaves [ 3440.820619] bond1204 (unregistering): Releasing active interface bridge2138 [ 3440.902750] bond1204 (unregistering): Releasing active interface bridge2137 [ 3440.909898] device bridge2137 left promiscuous mode [ 3441.003363] bond1204 (unregistering): Released all slaves [ 3441.019333] bond1203 (unregistering): Releasing active interface bridge2136 [ 3441.102727] bond1203 (unregistering): Releasing active interface bridge2135 [ 3441.109896] device bridge2135 left promiscuous mode [ 3441.203473] bond1203 (unregistering): Released all slaves [ 3441.214638] bond1202 (unregistering): Releasing active interface bridge2134 [ 3441.302796] bond1202 (unregistering): Releasing active interface bridge2133 [ 3441.309943] device bridge2133 left promiscuous mode [ 3441.403497] bond1202 (unregistering): Released all slaves [ 3441.419387] bond1201 (unregistering): Releasing active interface bridge2132 [ 3441.502841] bond1201 (unregistering): Releasing active interface bridge2131 [ 3441.509991] device bridge2131 left promiscuous mode [ 3441.603692] bond1201 (unregistering): Released all slaves [ 3441.619989] bond1200 (unregistering): Releasing active interface bridge2130 [ 3441.702883] bond1200 (unregistering): Releasing active interface bridge2129 [ 3441.710027] device bridge2129 left promiscuous mode [ 3441.803601] bond1200 (unregistering): Released all slaves [ 3441.819735] bond1199 (unregistering): Releasing active interface bridge2128 [ 3441.912985] bond1199 (unregistering): Releasing active interface bridge2127 [ 3441.920145] device bridge2127 left promiscuous mode [ 3442.013404] bond1199 (unregistering): Released all slaves [ 3442.029388] bond1198 (unregistering): Releasing active interface bridge2126 [ 3442.038786] device bridge2126 left promiscuous mode [ 3442.133351] bond1198 (unregistering): Released all slaves [ 3442.192900] bond1197 (unregistering): Releasing active interface bridge2124 [ 3442.200068] device bridge2124 left promiscuous mode [ 3442.293324] bond1197 (unregistering): Released all slaves [ 3442.309102] bond1196 (unregistering): Releasing active interface bridge2123 [ 3442.394914] bond1196 (unregistering): Releasing active interface bridge2122 [ 3442.407456] device bridge2122 left promiscuous mode [ 3442.494132] bond1196 (unregistering): Released all slaves [ 3442.553053] bond1195 (unregistering): Releasing active interface bridge2120 [ 3442.565627] device bridge2120 left promiscuous mode [ 3442.653441] bond1195 (unregistering): Released all slaves [ 3442.713216] bond1194 (unregistering): Releasing active interface bridge2118 [ 3442.725862] device bridge2118 left promiscuous mode [ 3442.813423] bond1194 (unregistering): Released all slaves [ 3442.829719] bond1193 (unregistering): Releasing active interface bridge2117 [ 3442.933068] bond1193 (unregistering): Releasing active interface bridge2116 [ 3442.945794] device bridge2116 left promiscuous mode [ 3443.033381] bond1193 (unregistering): Released all slaves [ 3443.049401] bond1192 (unregistering): Releasing active interface bridge2115 [ 3443.132943] bond1192 (unregistering): Releasing active interface bridge2114 [ 3443.140106] device bridge2114 left promiscuous mode [ 3443.233506] bond1192 (unregistering): Released all slaves [ 3443.251383] bond1191 (unregistering): Releasing active interface bridge2113 [ 3443.342754] bond1191 (unregistering): Releasing active interface bridge2112 [ 3443.349927] device bridge2112 left promiscuous mode [ 3443.443152] bond1191 (unregistering): Released all slaves [ 3443.459218] bond1190 (unregistering): Releasing active interface bridge2111 [ 3443.466443] device bridge2111 left promiscuous mode [ 3443.563478] bond1190 (unregistering): Released all slaves [ 3443.579677] bond1189 (unregistering): Releasing active interface bridge2110 [ 3443.663569] bond1189 (unregistering): Releasing active interface bridge2109 [ 3443.676221] device bridge2109 left promiscuous mode [ 3443.765199] bond1189 (unregistering): Released all slaves [ 3443.781531] bond1188 (unregistering): Releasing active interface bridge2108 [ 3443.862809] bond1188 (unregistering): Releasing active interface bridge2107 [ 3443.869962] device bridge2107 left promiscuous mode [ 3443.963513] bond1188 (unregistering): Released all slaves [ 3443.979399] bond1187 (unregistering): Releasing active interface bridge2106 [ 3444.062904] bond1187 (unregistering): Releasing active interface bridge2105 [ 3444.070076] device bridge2105 left promiscuous mode [ 3444.163527] bond1187 (unregistering): Released all slaves [ 3444.179655] bond1186 (unregistering): Releasing active interface bridge2104 [ 3444.262797] bond1186 (unregistering): Releasing active interface bridge2103 [ 3444.269972] device bridge2103 left promiscuous mode [ 3444.363370] bond1186 (unregistering): Released all slaves [ 3444.379216] bond1185 (unregistering): Releasing active interface bridge2102 [ 3444.472857] bond1185 (unregistering): Releasing active interface bridge2101 [ 3444.480024] device bridge2101 left promiscuous mode [ 3444.574026] bond1185 (unregistering): Released all slaves [ 3444.590629] bond1184 (unregistering): Releasing active interface bridge2100 [ 3444.672775] bond1184 (unregistering): Releasing active interface bridge2099 [ 3444.679929] device bridge2099 left promiscuous mode [ 3444.773466] bond1184 (unregistering): Released all slaves [ 3444.789666] bond1183 (unregistering): Releasing active interface bridge2098 [ 3444.796847] device bridge2098 left promiscuous mode [ 3444.893322] bond1183 (unregistering): Released all slaves [ 3444.904208] bond1182 (unregistering): Releasing active interface bridge2097 [ 3444.982879] bond1182 (unregistering): Releasing active interface bridge2096 [ 3444.990030] device bridge2096 left promiscuous mode [ 3445.083266] bond1182 (unregistering): Released all slaves [ 3445.102081] bond1181 (unregistering): Releasing active interface bridge2095 [ 3445.182723] bond1181 (unregistering): Releasing active interface bridge2094 [ 3445.189871] device bridge2094 left promiscuous mode [ 3445.283320] bond1181 (unregistering): Released all slaves [ 3445.294837] bond1180 (unregistering): Releasing active interface bridge2093 [ 3445.382796] bond1180 (unregistering): Releasing active interface bridge2092 [ 3445.389937] device bridge2092 left promiscuous mode [ 3445.484095] bond1180 (unregistering): Released all slaves [ 3445.500191] bond1179 (unregistering): Releasing active interface bridge2091 [ 3445.582590] bond1179 (unregistering): Releasing active interface bridge2090 [ 3445.589721] device bridge2090 left promiscuous mode [ 3445.684227] bond1179 (unregistering): Released all slaves [ 3445.700286] bond1178 (unregistering): Releasing active interface bridge2089 [ 3445.782838] bond1178 (unregistering): Releasing active interface bridge2088 [ 3445.789965] device bridge2088 left promiscuous mode [ 3445.883420] bond1178 (unregistering): Released all slaves [ 3445.899879] bond1177 (unregistering): Releasing active interface bridge2087 [ 3445.982656] bond1177 (unregistering): Releasing active interface bridge2086 [ 3445.989821] device bridge2086 left promiscuous mode [ 3446.083247] bond1177 (unregistering): Released all slaves [ 3446.098918] bond1176 (unregistering): Releasing active interface bridge2085 [ 3446.182891] bond1176 (unregistering): Releasing active interface bridge2084 [ 3446.190071] device bridge2084 left promiscuous mode [ 3446.283248] bond1176 (unregistering): Released all slaves [ 3446.299065] bond1175 (unregistering): Releasing active interface bridge2083 [ 3446.383665] bond1175 (unregistering): Releasing active interface bridge2082 [ 3446.396259] device bridge2082 left promiscuous mode [ 3446.485690] bond1175 (unregistering): Released all slaves [ 3446.501874] bond1174 (unregistering): Releasing active interface bridge2081 [ 3446.582736] bond1174 (unregistering): Releasing active interface bridge2080 [ 3446.589923] device bridge2080 left promiscuous mode [ 3446.683465] bond1174 (unregistering): Released all slaves [ 3446.699567] bond1173 (unregistering): Releasing active interface bridge2079 [ 3446.782701] bond1173 (unregistering): Releasing active interface bridge2078 [ 3446.789860] device bridge2078 left promiscuous mode [ 3446.883361] bond1173 (unregistering): Released all slaves [ 3446.899240] bond1172 (unregistering): Releasing active interface bridge2077 [ 3446.983199] bond1172 (unregistering): Releasing active interface bridge2076 [ 3446.998131] device bridge2076 left promiscuous mode [ 3447.083404] bond1172 (unregistering): Released all slaves [ 3447.099875] bond1171 (unregistering): Releasing active interface bridge2075 [ 3447.107111] device bridge2075 left promiscuous mode [ 3447.203437] bond1171 (unregistering): Released all slaves [ 3447.219808] bond1170 (unregistering): Releasing active interface bridge2074 [ 3447.303603] bond1170 (unregistering): Releasing active interface bridge2073 [ 3447.319173] device bridge2073 left promiscuous mode [ 3447.403459] bond1170 (unregistering): Released all slaves [ 3447.419980] bond1169 (unregistering): Releasing active interface bridge2072 [ 3447.502751] bond1169 (unregistering): Releasing active interface bridge2071 [ 3447.509940] device bridge2071 left promiscuous mode [ 3447.603416] bond1169 (unregistering): Released all slaves [ 3447.663467] bond1168 (unregistering): Released all slaves [ 3447.679584] bond1167 (unregistering): Releasing active interface bridge2069 [ 3447.686770] device bridge2069 left promiscuous mode [ 3447.785175] bond1167 (unregistering): Released all slaves [ 3447.801439] bond1166 (unregistering): Releasing active interface bridge2068 [ 3447.882952] bond1166 (unregistering): Releasing active interface bridge2067 [ 3447.890191] device bridge2067 left promiscuous mode [ 3447.983387] bond1166 (unregistering): Released all slaves [ 3447.999394] bond1165 (unregistering): Releasing active interface bridge2066 [ 3448.083559] bond1165 (unregistering): Releasing active interface bridge2065 [ 3448.096124] device bridge2065 left promiscuous mode [ 3448.183362] bond1165 (unregistering): Released all slaves [ 3448.243572] bond1164 (unregistering): Released all slaves [ 3448.259711] bond1163 (unregistering): Releasing active interface bridge2063 [ 3448.266919] device bridge2063 left promiscuous mode [ 3448.363418] bond1163 (unregistering): Released all slaves [ 3448.379432] bond1162 (unregistering): Releasing active interface bridge2062 [ 3448.462799] bond1162 (unregistering): Releasing active interface bridge2061 [ 3448.469952] device bridge2061 left promiscuous mode [ 3448.563498] bond1162 (unregistering): Released all slaves [ 3448.579267] bond1161 (unregistering): Releasing active interface bridge2060 [ 3448.662773] bond1161 (unregistering): Releasing active interface bridge2059 [ 3448.669917] device bridge2059 left promiscuous mode [ 3448.763382] bond1161 (unregistering): Released all slaves [ 3448.779278] bond1160 (unregistering): Releasing active interface bridge2058 [ 3448.863613] bond1160 (unregistering): Releasing active interface bridge2057 [ 3448.876147] device bridge2057 left promiscuous mode [ 3448.963340] bond1160 (unregistering): Released all slaves [ 3448.979204] bond1159 (unregistering): Releasing active interface bridge2056 [ 3449.064867] bond1159 (unregistering): Releasing active interface bridge2055 [ 3449.079499] device bridge2055 left promiscuous mode [ 3449.163395] bond1159 (unregistering): Released all slaves [ 3449.179422] bond1158 (unregistering): Releasing active interface bridge2054 [ 3449.262911] bond1158 (unregistering): Releasing active interface bridge2053 [ 3449.270060] device bridge2053 left promiscuous mode [ 3449.363436] bond1158 (unregistering): Released all slaves [ 3449.379429] bond1157 (unregistering): Releasing active interface bridge2052 [ 3449.462722] bond1157 (unregistering): Releasing active interface bridge2051 [ 3449.469873] device bridge2051 left promiscuous mode [ 3449.563410] bond1157 (unregistering): Released all slaves [ 3449.579175] bond1156 (unregistering): Releasing active interface bridge2050 [ 3449.672927] bond1156 (unregistering): Releasing active interface bridge2049 [ 3449.680101] device bridge2049 left promiscuous mode [ 3449.774333] bond1156 (unregistering): Released all slaves [ 3449.792712] bond1155 (unregistering): Releasing active interface bridge2048 [ 3449.873062] bond1155 (unregistering): Releasing active interface bridge2047 [ 3449.885720] device bridge2047 left promiscuous mode [ 3449.973495] bond1155 (unregistering): Released all slaves [ 3449.989715] bond1154 (unregistering): Releasing active interface bridge2046 [ 3450.072783] bond1154 (unregistering): Releasing active interface bridge2045 [ 3450.079933] device bridge2045 left promiscuous mode [ 3450.173458] bond1154 (unregistering): Released all slaves [ 3450.189575] bond1153 (unregistering): Releasing active interface bridge2044 [ 3450.272908] bond1153 (unregistering): Releasing active interface bridge2043 [ 3450.280056] device bridge2043 left promiscuous mode [ 3450.373270] bond1153 (unregistering): Released all slaves [ 3450.388765] bond1152 (unregistering): Releasing active interface bridge2042 [ 3450.475014] bond1152 (unregistering): Releasing active interface bridge2041 [ 3450.487565] device bridge2041 left promiscuous mode [ 3450.573629] bond1152 (unregistering): Released all slaves [ 3450.589722] bond1151 (unregistering): Releasing active interface bridge2040 [ 3450.672903] bond1151 (unregistering): Releasing active interface bridge2039 [ 3450.680052] device bridge2039 left promiscuous mode [ 3450.773545] bond1151 (unregistering): Released all slaves [ 3450.789925] bond1150 (unregistering): Releasing active interface bridge2038 [ 3450.872833] bond1150 (unregistering): Releasing active interface bridge2037 [ 3450.879982] device bridge2037 left promiscuous mode [ 3450.973409] bond1150 (unregistering): Released all slaves [ 3450.989664] bond1149 (unregistering): Releasing active interface bridge2036 [ 3450.997816] device bridge2036 left promiscuous mode [ 3451.093353] bond1149 (unregistering): Released all slaves [ 3451.109481] bond1148 (unregistering): Releasing active interface bridge2035 [ 3451.192686] bond1148 (unregistering): Releasing active interface bridge2034 [ 3451.199832] device bridge2034 left promiscuous mode [ 3451.293396] bond1148 (unregistering): Released all slaves [ 3451.309434] bond1147 (unregistering): Releasing active interface bridge2033 [ 3451.392782] bond1147 (unregistering): Releasing active interface bridge2032 [ 3451.399953] device bridge2032 left promiscuous mode [ 3451.493550] bond1147 (unregistering): Released all slaves [ 3451.509665] bond1146 (unregistering): Releasing active interface bridge2031 [ 3451.593571] bond1146 (unregistering): Releasing active interface bridge2030 [ 3451.606084] device bridge2030 left promiscuous mode [ 3451.693405] bond1146 (unregistering): Released all slaves [ 3451.709378] bond1145 (unregistering): Releasing active interface bridge2029 [ 3451.815050] bond1145 (unregistering): Releasing active interface bridge2028 [ 3451.827645] device bridge2028 left promiscuous mode [ 3451.913215] bond1145 (unregistering): Released all slaves [ 3451.929166] bond1144 (unregistering): Releasing active interface bridge2027 [ 3452.012652] bond1144 (unregistering): Releasing active interface bridge2026 [ 3452.019798] device bridge2026 left promiscuous mode [ 3452.114191] bond1144 (unregistering): Released all slaves [ 3452.129997] bond1143 (unregistering): Releasing active interface bridge2025 [ 3452.212724] bond1143 (unregistering): Releasing active interface bridge2024 [ 3452.219871] device bridge2024 left promiscuous mode [ 3452.313389] bond1143 (unregistering): Released all slaves [ 3452.329179] bond1142 (unregistering): Releasing active interface bridge2023 [ 3452.412774] bond1142 (unregistering): Releasing active interface bridge2022 [ 3452.419924] device bridge2022 left promiscuous mode [ 3452.513491] bond1142 (unregistering): Released all slaves [ 3452.530537] bond1141 (unregistering): Releasing active interface bridge2021 [ 3452.537772] device bridge2021 left promiscuous mode [ 3452.634188] bond1141 (unregistering): Released all slaves [ 3452.650414] bond1140 (unregistering): Releasing active interface bridge2020 [ 3452.732968] bond1140 (unregistering): Releasing active interface bridge2019 [ 3452.740116] device bridge2019 left promiscuous mode [ 3452.833068] bond1140 (unregistering): Released all slaves [ 3452.893667] bond1139 (unregistering): Releasing active interface bridge2017 [ 3452.906132] device bridge2017 left promiscuous mode [ 3452.993395] bond1139 (unregistering): Released all slaves [ 3453.009655] bond1138 (unregistering): Releasing active interface bridge2016 [ 3453.092759] bond1138 (unregistering): Releasing active interface bridge2015 [ 3453.099953] device bridge2015 left promiscuous mode [ 3453.195204] bond1138 (unregistering): Released all slaves [ 3453.211444] bond1137 (unregistering): Releasing active interface bridge2014 [ 3453.302770] bond1137 (unregistering): Releasing active interface bridge2013 [ 3453.309916] device bridge2013 left promiscuous mode [ 3453.403598] bond1137 (unregistering): Released all slaves [ 3453.420704] bond1136 (unregistering): Releasing active interface bridge2012 [ 3453.502777] bond1136 (unregistering): Releasing active interface bridge2011 [ 3453.509954] device bridge2011 left promiscuous mode [ 3453.603522] bond1136 (unregistering): Released all slaves [ 3453.663071] bond1135 (unregistering): Releasing active interface bridge2009 [ 3453.676387] device bridge2009 left promiscuous mode [ 3453.763595] bond1135 (unregistering): Released all slaves [ 3453.779532] bond1134 (unregistering): Releasing active interface bridge2008 [ 3453.872913] bond1134 (unregistering): Releasing active interface bridge2007 [ 3453.880069] device bridge2007 left promiscuous mode [ 3453.973633] bond1134 (unregistering): Released all slaves [ 3453.989548] bond1133 (unregistering): Releasing active interface bridge2006 [ 3454.072750] bond1133 (unregistering): Releasing active interface bridge2005 [ 3454.079981] device bridge2005 left promiscuous mode [ 3454.173522] bond1133 (unregistering): Released all slaves [ 3454.189932] bond1132 (unregistering): Releasing active interface bridge2004 [ 3454.272780] bond1132 (unregistering): Releasing active interface bridge2003 [ 3454.279930] device bridge2003 left promiscuous mode [ 3454.373495] bond1132 (unregistering): Released all slaves [ 3454.389333] bond1131 (unregistering): Releasing active interface bridge2002 [ 3454.472882] bond1131 (unregistering): Releasing active interface bridge2001 [ 3454.480037] device bridge2001 left promiscuous mode [ 3454.575172] bond1131 (unregistering): Released all slaves [ 3454.594798] bond1130 (unregistering): Releasing active interface bridge2000 [ 3454.692838] bond1130 (unregistering): Releasing active interface bridge1999 [ 3454.700116] device bridge1999 left promiscuous mode [ 3454.793473] bond1130 (unregistering): Released all slaves [ 3454.809607] bond1129 (unregistering): Releasing active interface bridge1998 [ 3454.892854] bond1129 (unregistering): Releasing active interface bridge1997 [ 3454.900024] device bridge1997 left promiscuous mode [ 3454.993695] bond1129 (unregistering): Released all slaves [ 3455.009786] bond1128 (unregistering): Releasing active interface bridge1996 [ 3455.093062] bond1128 (unregistering): Releasing active interface bridge1995 [ 3455.106481] device bridge1995 left promiscuous mode [ 3455.193312] bond1128 (unregistering): Released all slaves [ 3455.209666] bond1127 (unregistering): Releasing active interface bridge1994 [ 3455.292795] bond1127 (unregistering): Releasing active interface bridge1993 [ 3455.299947] device bridge1993 left promiscuous mode [ 3455.393421] bond1127 (unregistering): Released all slaves [ 3455.405924] bond1126 (unregistering): Releasing active interface bridge1992 [ 3455.493775] bond1126 (unregistering): Releasing active interface bridge1991 [ 3455.506308] device bridge1991 left promiscuous mode [ 3455.593559] bond1126 (unregistering): Released all slaves [ 3455.609556] bond1125 (unregistering): Releasing active interface bridge1990 [ 3455.692758] bond1125 (unregistering): Releasing active interface bridge1989 [ 3455.699912] device bridge1989 left promiscuous mode [ 3455.793471] bond1125 (unregistering): Released all slaves [ 3455.813749] bond1124 (unregistering): Releasing active interface bridge1988 [ 3455.922941] bond1124 (unregistering): Releasing active interface bridge1987 [ 3455.930103] device bridge1987 left promiscuous mode [ 3456.023541] bond1124 (unregistering): Released all slaves [ 3456.039763] bond1123 (unregistering): Releasing active interface bridge1986 [ 3456.122855] bond1123 (unregistering): Releasing active interface bridge1985 [ 3456.130010] device bridge1985 left promiscuous mode [ 3456.223446] bond1123 (unregistering): Released all slaves [ 3456.239211] bond1122 (unregistering): Releasing active interface bridge1984 [ 3456.322678] bond1122 (unregistering): Releasing active interface bridge1983 [ 3456.329831] device bridge1983 left promiscuous mode [ 3456.423394] bond1122 (unregistering): Released all slaves [ 3456.439410] bond1121 (unregistering): Releasing active interface bridge1982 [ 3456.522726] bond1121 (unregistering): Releasing active interface bridge1981 [ 3456.529873] device bridge1981 left promiscuous mode [ 3456.623397] bond1121 (unregistering): Released all slaves [ 3456.639385] bond1120 (unregistering): Releasing active interface bridge1980 [ 3456.723070] bond1120 (unregistering): Releasing active interface bridge1979 [ 3456.735398] device bridge1979 left promiscuous mode [ 3456.823618] bond1120 (unregistering): Released all slaves [ 3456.843953] bond1119 (unregistering): Releasing active interface bridge1978 [ 3456.942739] bond1119 (unregistering): Releasing active interface bridge1977 [ 3456.949893] device bridge1977 left promiscuous mode [ 3457.043430] bond1119 (unregistering): Released all slaves [ 3457.060195] bond1118 (unregistering): Releasing active interface bridge1976 [ 3457.142816] bond1118 (unregistering): Releasing active interface bridge1975 [ 3457.150046] device bridge1975 left promiscuous mode [ 3457.243443] bond1118 (unregistering): Released all slaves [ 3457.259183] bond1117 (unregistering): Releasing active interface bridge1974 [ 3457.266355] device bridge1974 left promiscuous mode [ 3457.365326] bond1117 (unregistering): Released all slaves [ 3457.381707] bond1116 (unregistering): Releasing active interface bridge1973 [ 3457.462843] bond1116 (unregistering): Releasing active interface bridge1972 [ 3457.470005] device bridge1972 left promiscuous mode [ 3457.563329] bond1116 (unregistering): Released all slaves [ 3457.579683] bond1115 (unregistering): Releasing active interface bridge1971 [ 3457.586866] device bridge1971 left promiscuous mode [ 3457.683320] bond1115 (unregistering): Released all slaves [ 3457.699345] bond1114 (unregistering): Releasing active interface bridge1970 [ 3457.782879] bond1114 (unregistering): Releasing active interface bridge1969 [ 3457.790029] device bridge1969 left promiscuous mode [ 3457.883282] bond1114 (unregistering): Released all slaves [ 3457.899311] bond1113 (unregistering): Releasing active interface bridge1968 [ 3457.906514] device bridge1968 left promiscuous mode [ 3458.003361] bond1113 (unregistering): Released all slaves [ 3458.018882] bond1112 (unregistering): Releasing active interface bridge1967 [ 3458.102796] bond1112 (unregistering): Releasing active interface bridge1966 [ 3458.109956] device bridge1966 left promiscuous mode [ 3458.203385] bond1112 (unregistering): Released all slaves [ 3458.262948] bond1111 (unregistering): Releasing active interface bridge1964 [ 3458.270129] device bridge1964 left promiscuous mode [ 3458.363427] bond1111 (unregistering): Released all slaves [ 3458.379401] bond1110 (unregistering): Releasing active interface bridge1963 [ 3458.462757] bond1110 (unregistering): Releasing active interface bridge1962 [ 3458.469928] device bridge1962 left promiscuous mode [ 3458.563188] bond1110 (unregistering): Released all slaves [ 3458.578967] bond1109 (unregistering): Releasing active interface bridge1961 [ 3458.672964] bond1109 (unregistering): Releasing active interface bridge1960 [ 3458.680134] device bridge1960 left promiscuous mode [ 3458.773381] bond1109 (unregistering): Released all slaves [ 3458.789364] bond1108 (unregistering): Releasing active interface bridge1959 [ 3458.872741] bond1108 (unregistering): Releasing active interface bridge1958 [ 3458.879895] device bridge1958 left promiscuous mode [ 3458.973429] bond1108 (unregistering): Released all slaves [ 3458.988984] bond1107 (unregistering): Releasing active interface bridge1957 [ 3459.072732] bond1107 (unregistering): Releasing active interface bridge1956 [ 3459.079879] device bridge1956 left promiscuous mode [ 3459.173380] bond1107 (unregistering): Released all slaves [ 3459.189128] bond1106 (unregistering): Releasing active interface bridge1955 [ 3459.273606] bond1106 (unregistering): Releasing active interface bridge1954 [ 3459.286201] device bridge1954 left promiscuous mode [ 3459.373389] bond1106 (unregistering): Released all slaves [ 3459.389331] bond1105 (unregistering): Releasing active interface bridge1953 [ 3459.482829] bond1105 (unregistering): Releasing active interface bridge1952 [ 3459.489984] device bridge1952 left promiscuous mode [ 3459.583228] bond1105 (unregistering): Released all slaves [ 3459.598784] bond1104 (unregistering): Releasing active interface bridge1951 [ 3459.682809] bond1104 (unregistering): Releasing active interface bridge1950 [ 3459.689968] device bridge1950 left promiscuous mode [ 3459.783463] bond1104 (unregistering): Released all slaves [ 3459.803006] bond1103 (unregistering): Releasing active interface bridge1949 [ 3459.902969] bond1103 (unregistering): Releasing active interface bridge1948 [ 3459.910125] device bridge1948 left promiscuous mode [ 3460.003458] bond1103 (unregistering): Released all slaves [ 3460.019603] bond1102 (unregistering): Releasing active interface bridge1947 [ 3460.104831] bond1102 (unregistering): Releasing active interface bridge1946 [ 3460.117451] device bridge1946 left promiscuous mode [ 3460.203550] bond1102 (unregistering): Released all slaves [ 3460.219758] bond1101 (unregistering): Releasing active interface bridge1945 [ 3460.302745] bond1101 (unregistering): Releasing active interface bridge1944 [ 3460.309903] device bridge1944 left promiscuous mode [ 3460.403239] bond1101 (unregistering): Released all slaves [ 3460.419016] bond1100 (unregistering): Releasing active interface bridge1943 [ 3460.502739] bond1100 (unregistering): Releasing active interface bridge1942 [ 3460.509881] device bridge1942 left promiscuous mode [ 3460.603490] bond1100 (unregistering): Released all slaves [ 3460.619569] bond1099 (unregistering): Releasing active interface bridge1941 [ 3460.703523] bond1099 (unregistering): Releasing active interface bridge1940 [ 3460.716148] device bridge1940 left promiscuous mode [ 3460.803386] bond1099 (unregistering): Released all slaves [ 3460.819687] bond1098 (unregistering): Releasing active interface bridge1939 [ 3460.902819] bond1098 (unregistering): Releasing active interface bridge1938 [ 3460.909945] device bridge1938 left promiscuous mode [ 3461.003255] bond1098 (unregistering): Released all slaves [ 3461.018509] bond1097 (unregistering): Releasing active interface bridge1937 [ 3461.112869] bond1097 (unregistering): Releasing active interface bridge1936 [ 3461.120018] device bridge1936 left promiscuous mode [ 3461.213313] bond1097 (unregistering): Released all slaves [ 3461.272963] bond1096 (unregistering): Releasing active interface bridge1934 [ 3461.280117] device bridge1934 left promiscuous mode [ 3461.373531] bond1096 (unregistering): Released all slaves [ 3461.389847] bond1095 (unregistering): Releasing active interface bridge1933 [ 3461.474277] bond1095 (unregistering): Releasing active interface bridge1932 [ 3461.487522] device bridge1932 left promiscuous mode [ 3461.573323] bond1095 (unregistering): Released all slaves [ 3461.589274] bond1094 (unregistering): Releasing active interface bridge1931 [ 3461.672800] bond1094 (unregistering): Releasing active interface bridge1930 [ 3461.679954] device bridge1930 left promiscuous mode [ 3461.773507] bond1094 (unregistering): Released all slaves [ 3461.789478] bond1093 (unregistering): Releasing active interface bridge1929 [ 3461.892915] bond1093 (unregistering): Releasing active interface bridge1928 [ 3461.900068] device bridge1928 left promiscuous mode [ 3462.004222] bond1093 (unregistering): Released all slaves [ 3462.020329] bond1092 (unregistering): Releasing active interface bridge1927 [ 3462.102760] bond1092 (unregistering): Releasing active interface bridge1926 [ 3462.109932] device bridge1926 left promiscuous mode [ 3462.203509] bond1092 (unregistering): Released all slaves [ 3462.219866] bond1091 (unregistering): Releasing active interface bridge1925 [ 3462.302804] bond1091 (unregistering): Releasing active interface bridge1924 [ 3462.309968] device bridge1924 left promiscuous mode [ 3462.403457] bond1091 (unregistering): Released all slaves [ 3462.419746] bond1090 (unregistering): Releasing active interface bridge1923 [ 3462.502907] bond1090 (unregistering): Releasing active interface bridge1922 [ 3462.510057] device bridge1922 left promiscuous mode [ 3462.603193] bond1090 (unregistering): Released all slaves [ 3462.619182] bond1089 (unregistering): Releasing active interface bridge1921 [ 3462.702842] bond1089 (unregistering): Releasing active interface bridge1920 [ 3462.710137] device bridge1920 left promiscuous mode [ 3462.803432] bond1089 (unregistering): Released all slaves [ 3462.865579] bond1088 (unregistering): Released all slaves [ 3462.881914] bond1087 (unregistering): Releasing active interface bridge1918 [ 3462.889067] device bridge1918 left promiscuous mode [ 3462.973666] bond1087 (unregistering): Released all slaves [ 3463.033856] bond1086 (unregistering): Released all slaves [ 3463.050912] bond1085 (unregistering): Releasing active interface bridge1916 [ 3463.058058] device bridge1916 left promiscuous mode [ 3463.143491] bond1085 (unregistering): Released all slaves [ 3463.161798] bond1084 (unregistering): Releasing active interface bridge1915 [ 3463.242759] bond1084 (unregistering): Releasing active interface bridge1914 [ 3463.249913] device bridge1914 left promiscuous mode [ 3463.343519] bond1084 (unregistering): Released all slaves [ 3463.403108] bond1083 (unregistering): Releasing active interface bridge1912 [ 3463.415702] device bridge1912 left promiscuous mode [ 3463.503554] bond1083 (unregistering): Released all slaves [ 3463.563619] bond1082 (unregistering): Releasing active interface bridge1910 [ 3463.576215] device bridge1910 left promiscuous mode [ 3463.663401] bond1082 (unregistering): Released all slaves [ 3463.674760] bond1081 (unregistering): Releasing active interface bridge1909 [ 3463.762726] bond1081 (unregistering): Releasing active interface bridge1908 [ 3463.769875] device bridge1908 left promiscuous mode [ 3463.863386] bond1081 (unregistering): Released all slaves [ 3463.881696] bond1080 (unregistering): Releasing active interface bridge1907 [ 3463.962716] bond1080 (unregistering): Releasing active interface bridge1906 [ 3463.969867] device bridge1906 left promiscuous mode [ 3464.064780] bond1080 (unregistering): Released all slaves [ 3464.081899] bond1079 (unregistering): Releasing active interface bridge1905 [ 3464.162729] bond1079 (unregistering): Releasing active interface bridge1904 [ 3464.169885] device bridge1904 left promiscuous mode [ 3464.263612] bond1079 (unregistering): Released all slaves [ 3464.333622] bond1078 (unregistering): Released all slaves [ 3464.352910] bond1077 (unregistering): Releasing active interface bridge1902 [ 3464.360078] device bridge1902 left promiscuous mode [ 3464.453434] bond1077 (unregistering): Released all slaves [ 3464.469706] bond1076 (unregistering): Releasing active interface bridge1901 [ 3464.552772] bond1076 (unregistering): Releasing active interface bridge1900 [ 3464.559927] device bridge1900 left promiscuous mode [ 3464.653403] bond1076 (unregistering): Released all slaves [ 3464.669340] bond1075 (unregistering): Releasing active interface bridge1899 [ 3464.762787] bond1075 (unregistering): Releasing active interface bridge1898 [ 3464.769940] device bridge1898 left promiscuous mode [ 3464.864218] bond1075 (unregistering): Released all slaves [ 3464.880652] bond1074 (unregistering): Releasing active interface bridge1897 [ 3464.962609] bond1074 (unregistering): Releasing active interface bridge1896 [ 3464.969759] device bridge1896 left promiscuous mode [ 3465.063498] bond1074 (unregistering): Released all slaves [ 3465.123813] bond1073 (unregistering): Releasing active interface bridge1894 [ 3465.136609] device bridge1894 left promiscuous mode [ 3465.223403] bond1073 (unregistering): Released all slaves [ 3465.241630] bond1072 (unregistering): Releasing active interface bridge1893 [ 3465.322750] bond1072 (unregistering): Releasing active interface bridge1892 [ 3465.329884] device bridge1892 left promiscuous mode [ 3465.423432] bond1072 (unregistering): Released all slaves [ 3465.439830] bond1071 (unregistering): Releasing active interface bridge1891 [ 3465.522989] bond1071 (unregistering): Releasing active interface bridge1890 [ 3465.530183] device bridge1890 left promiscuous mode [ 3465.623359] bond1071 (unregistering): Released all slaves [ 3465.641535] bond1070 (unregistering): Releasing active interface bridge1889 [ 3465.722672] bond1070 (unregistering): Releasing active interface bridge1888 [ 3465.729836] device bridge1888 left promiscuous mode [ 3465.823449] bond1070 (unregistering): Released all slaves [ 3465.839485] bond1069 (unregistering): Releasing active interface bridge1887 [ 3465.922801] bond1069 (unregistering): Releasing active interface bridge1886 [ 3465.929957] device bridge1886 left promiscuous mode [ 3466.034297] bond1069 (unregistering): Released all slaves [ 3466.051270] bond1068 (unregistering): Releasing active interface bridge1885 [ 3466.132766] bond1068 (unregistering): Releasing active interface bridge1884 [ 3466.139925] device bridge1884 left promiscuous mode [ 3466.233414] bond1068 (unregistering): Released all slaves [ 3466.249385] bond1067 (unregistering): Releasing active interface bridge1883 [ 3466.332768] bond1067 (unregistering): Releasing active interface bridge1882 [ 3466.339936] device bridge1882 left promiscuous mode [ 3466.433591] bond1067 (unregistering): Released all slaves [ 3466.449508] bond1066 (unregistering): Releasing active interface bridge1881 [ 3466.532769] bond1066 (unregistering): Releasing active interface bridge1880 [ 3466.539938] device bridge1880 left promiscuous mode [ 3466.633557] bond1066 (unregistering): Released all slaves [ 3466.645128] bond1065 (unregistering): Releasing active interface bridge1879 [ 3466.732828] bond1065 (unregistering): Releasing active interface bridge1878 [ 3466.740003] device bridge1878 left promiscuous mode [ 3466.833496] bond1065 (unregistering): Released all slaves [ 3466.851603] bond1064 (unregistering): Releasing active interface bridge1877 [ 3466.932739] bond1064 (unregistering): Releasing active interface bridge1876 [ 3466.940010] device bridge1876 left promiscuous mode [ 3467.033457] bond1064 (unregistering): Released all slaves [ 3467.093604] bond1063 (unregistering): Released all slaves [ 3467.109598] bond1062 (unregistering): Releasing active interface bridge1874 [ 3467.116813] device bridge1874 left promiscuous mode [ 3467.213418] bond1062 (unregistering): Released all slaves [ 3467.229373] bond1061 (unregistering): Releasing active interface bridge1873 [ 3467.246403] device bridge1873 left promiscuous mode [ 3467.334162] bond1061 (unregistering): Released all slaves [ 3467.350530] bond1060 (unregistering): Releasing active interface bridge1872 [ 3467.432693] bond1060 (unregistering): Releasing active interface bridge1871 [ 3467.439930] device bridge1871 left promiscuous mode [ 3467.533447] bond1060 (unregistering): Released all slaves [ 3467.549502] bond1059 (unregistering): Releasing active interface bridge1870 [ 3467.632789] bond1059 (unregistering): Releasing active interface bridge1869 [ 3467.639939] device bridge1869 left promiscuous mode [ 3467.733441] bond1059 (unregistering): Released all slaves [ 3467.749454] bond1058 (unregistering): Releasing active interface bridge1868 [ 3467.832973] bond1058 (unregistering): Releasing active interface bridge1867 [ 3467.840112] device bridge1867 left promiscuous mode [ 3467.933453] bond1058 (unregistering): Released all slaves [ 3467.949715] bond1057 (unregistering): Releasing active interface bridge1866 [ 3468.032725] bond1057 (unregistering): Releasing active interface bridge1865 [ 3468.039898] device bridge1865 left promiscuous mode [ 3468.143513] bond1057 (unregistering): Released all slaves [ 3468.159409] bond1056 (unregistering): Releasing active interface bridge1864 [ 3468.243479] bond1056 (unregistering): Releasing active interface bridge1863 [ 3468.256562] device bridge1863 left promiscuous mode [ 3468.343580] bond1056 (unregistering): Released all slaves [ 3468.402837] bond1055 (unregistering): Releasing active interface bridge1861 [ 3468.415800] device bridge1861 left promiscuous mode [ 3468.504185] bond1055 (unregistering): Released all slaves [ 3468.520120] bond1054 (unregistering): Releasing active interface bridge1860 [ 3468.602673] bond1054 (unregistering): Releasing active interface bridge1859 [ 3468.609831] device bridge1859 left promiscuous mode [ 3468.703422] bond1054 (unregistering): Released all slaves [ 3468.764150] bond1053 (unregistering): Releasing active interface bridge1857 [ 3468.776696] device bridge1857 left promiscuous mode [ 3468.863235] bond1053 (unregistering): Released all slaves [ 3468.879307] bond1052 (unregistering): Releasing active interface bridge1856 [ 3468.962812] bond1052 (unregistering): Releasing active interface bridge1855 [ 3468.969974] device bridge1855 left promiscuous mode [ 3469.063368] bond1052 (unregistering): Released all slaves [ 3469.081501] bond1051 (unregistering): Releasing active interface bridge1854 [ 3469.172796] bond1051 (unregistering): Releasing active interface bridge1853 [ 3469.179957] device bridge1853 left promiscuous mode [ 3469.273454] bond1051 (unregistering): Released all slaves [ 3469.289685] bond1050 (unregistering): Releasing active interface bridge1852 [ 3469.372824] bond1050 (unregistering): Releasing active interface bridge1851 [ 3469.380003] device bridge1851 left promiscuous mode [ 3469.473714] bond1050 (unregistering): Released all slaves [ 3469.489670] bond1049 (unregistering): Releasing active interface bridge1850 [ 3469.572987] bond1049 (unregistering): Releasing active interface bridge1849 [ 3469.580181] device bridge1849 left promiscuous mode [ 3469.674125] bond1049 (unregistering): Released all slaves [ 3469.690441] bond1048 (unregistering): Releasing active interface bridge1848 [ 3469.772716] bond1048 (unregistering): Releasing active interface bridge1847 [ 3469.779884] device bridge1847 left promiscuous mode [ 3469.873671] bond1048 (unregistering): Released all slaves [ 3469.893909] bond1047 (unregistering): Releasing active interface bridge1846 [ 3470.002787] bond1047 (unregistering): Releasing active interface bridge1845 [ 3470.009947] device bridge1845 left promiscuous mode [ 3470.103389] bond1047 (unregistering): Released all slaves [ 3470.121339] bond1046 (unregistering): Releasing active interface bridge1844 [ 3470.203493] bond1046 (unregistering): Releasing active interface bridge1843 [ 3470.216350] device bridge1843 left promiscuous mode [ 3470.303438] bond1046 (unregistering): Released all slaves [ 3470.319362] bond1045 (unregistering): Releasing active interface bridge1842 [ 3470.402982] bond1045 (unregistering): Releasing active interface bridge1841 [ 3470.410158] device bridge1841 left promiscuous mode [ 3470.503505] bond1045 (unregistering): Released all slaves [ 3470.519283] bond1044 (unregistering): Releasing active interface bridge1840 [ 3470.602740] bond1044 (unregistering): Releasing active interface bridge1839 [ 3470.609892] device bridge1839 left promiscuous mode [ 3470.704206] bond1044 (unregistering): Released all slaves [ 3470.720322] bond1043 (unregistering): Releasing active interface bridge1838 [ 3470.802799] bond1043 (unregistering): Releasing active interface bridge1837 [ 3470.809954] device bridge1837 left promiscuous mode [ 3470.903469] bond1043 (unregistering): Released all slaves [ 3470.921491] bond1042 (unregistering): Releasing active interface bridge1836 [ 3471.003070] bond1042 (unregistering): Releasing active interface bridge1835 [ 3471.015902] device bridge1835 left promiscuous mode [ 3471.103516] bond1042 (unregistering): Released all slaves [ 3471.161065] bond1041 (unregistering): Releasing active interface bridge1833 [ 3471.168228] device bridge1833 left promiscuous mode [ 3471.253614] bond1041 (unregistering): Released all slaves [ 3471.269936] bond1040 (unregistering): Releasing active interface bridge1832 [ 3471.353834] bond1040 (unregistering): Releasing active interface bridge1831 [ 3471.366701] device bridge1831 left promiscuous mode [ 3471.453467] bond1040 (unregistering): Released all slaves [ 3471.469450] bond1039 (unregistering): Releasing active interface bridge1830 [ 3471.562692] bond1039 (unregistering): Releasing active interface bridge1829 [ 3471.569843] device bridge1829 left promiscuous mode [ 3471.663486] bond1039 (unregistering): Released all slaves [ 3471.679540] bond1038 (unregistering): Releasing active interface bridge1828 [ 3471.762822] bond1038 (unregistering): Releasing active interface bridge1827 [ 3471.769977] device bridge1827 left promiscuous mode [ 3471.863372] bond1038 (unregistering): Released all slaves [ 3471.882031] bond1037 (unregistering): Releasing active interface bridge1826 [ 3471.962690] bond1037 (unregistering): Releasing active interface bridge1825 [ 3471.969844] device bridge1825 left promiscuous mode [ 3472.063174] bond1037 (unregistering): Released all slaves [ 3472.081578] bond1036 (unregistering): Releasing active interface bridge1824 [ 3472.162966] bond1036 (unregistering): Releasing active interface bridge1823 [ 3472.175616] device bridge1823 left promiscuous mode [ 3472.264194] bond1036 (unregistering): Released all slaves [ 3472.323019] bond1035 (unregistering): Releasing active interface bridge1821 [ 3472.330174] device bridge1821 left promiscuous mode [ 3472.423276] bond1035 (unregistering): Released all slaves [ 3472.442975] bond1034 (unregistering): Releasing active interface bridge1820 [ 3472.523144] bond1034 (unregistering): Releasing active interface bridge1819 [ 3472.536293] device bridge1819 left promiscuous mode [ 3472.623250] bond1034 (unregistering): Released all slaves [ 3472.638958] bond1033 (unregistering): Releasing active interface bridge1818 [ 3472.722838] bond1033 (unregistering): Releasing active interface bridge1817 [ 3472.729997] device bridge1817 left promiscuous mode [ 3472.823345] bond1033 (unregistering): Released all slaves [ 3472.839900] bond1032 (unregistering): Releasing active interface bridge1816 [ 3472.922699] bond1032 (unregistering): Releasing active interface bridge1815 [ 3472.929855] device bridge1815 left promiscuous mode [ 3473.023532] bond1032 (unregistering): Released all slaves [ 3473.039585] bond1031 (unregistering): Releasing active interface bridge1814 [ 3473.122664] bond1031 (unregistering): Releasing active interface bridge1813 [ 3473.129830] device bridge1813 left promiscuous mode [ 3473.228465] bond1031 (unregistering): Released all slaves [ 3473.272411] bond1030 (unregistering): Releasing active interface bridge1812 [ 3473.354835] bond1030 (unregistering): Releasing active interface bridge1811 [ 3473.372499] device bridge1811 left promiscuous mode [ 3473.482469] bond1030 (unregistering): Released all slaves [ 3473.508217] bond1029 (unregistering): Releasing active interface bridge1810 [ 3473.628444] bond1029 (unregistering): Releasing active interface bridge1809 [ 3473.645246] device bridge1809 left promiscuous mode [ 3473.743043] bond1029 (unregistering): Released all slaves [ 3473.769389] bond1028 (unregistering): Releasing active interface bridge1808 [ 3473.863716] bond1028 (unregistering): Releasing active interface bridge1807 [ 3473.881896] device bridge1807 left promiscuous mode [ 3473.964385] bond1028 (unregistering): Released all slaves [ 3473.989376] bond1027 (unregistering): Releasing active interface bridge1806 [ 3474.088586] bond1027 (unregistering): Releasing active interface bridge1805 [ 3474.095877] device bridge1805 left promiscuous mode [ 3474.203268] bond1027 (unregistering): Released all slaves [ 3474.263611] bond1026 (unregistering): Released all slaves [ 3474.273849] bond1025 (unregistering): Releasing active interface bridge1803 [ 3474.281213] device bridge1803 left promiscuous mode [ 3474.363425] bond1025 (unregistering): Released all slaves [ 3474.379501] bond1024 (unregistering): Releasing active interface bridge1802 [ 3474.462679] bond1024 (unregistering): Releasing active interface bridge1801 [ 3474.469910] device bridge1801 left promiscuous mode [ 3474.563348] bond1024 (unregistering): Released all slaves [ 3474.578968] bond1023 (unregistering): Releasing active interface bridge1800 [ 3474.662566] bond1023 (unregistering): Releasing active interface bridge1799 [ 3474.669710] device bridge1799 left promiscuous mode [ 3474.763585] bond1023 (unregistering): Released all slaves [ 3474.779212] bond1022 (unregistering): Releasing active interface bridge1798 [ 3474.863463] bond1022 (unregistering): Releasing active interface bridge1797 [ 3474.875940] device bridge1797 left promiscuous mode [ 3474.963382] bond1022 (unregistering): Released all slaves [ 3474.979247] bond1021 (unregistering): Releasing active interface bridge1796 [ 3475.062681] bond1021 (unregistering): Releasing active interface bridge1795 [ 3475.069838] device bridge1795 left promiscuous mode [ 3475.163375] bond1021 (unregistering): Released all slaves [ 3475.222833] bond1020 (unregistering): Releasing active interface bridge1793 [ 3475.229982] device bridge1793 left promiscuous mode [ 3475.323359] bond1020 (unregistering): Released all slaves [ 3475.339437] bond1019 (unregistering): Releasing active interface bridge1792 [ 3475.422702] bond1019 (unregistering): Releasing active interface bridge1791 [ 3475.429939] device bridge1791 left promiscuous mode [ 3475.523446] bond1019 (unregistering): Released all slaves [ 3475.540000] bond1018 (unregistering): Releasing active interface bridge1790 [ 3475.622744] bond1018 (unregistering): Releasing active interface bridge1789 [ 3475.629892] device bridge1789 left promiscuous mode [ 3475.723454] bond1018 (unregistering): Released all slaves [ 3475.739307] bond1017 (unregistering): Releasing active interface bridge1788 [ 3475.822634] bond1017 (unregistering): Releasing active interface bridge1787 [ 3475.829772] device bridge1787 left promiscuous mode [ 3475.923438] bond1017 (unregistering): Released all slaves [ 3475.939250] bond1016 (unregistering): Releasing active interface bridge1786 [ 3476.022779] bond1016 (unregistering): Releasing active interface bridge1785 [ 3476.029905] device bridge1785 left promiscuous mode [ 3476.123278] bond1016 (unregistering): Released all slaves [ 3476.139211] bond1015 (unregistering): Releasing active interface bridge1784 [ 3476.146459] device bridge1784 left promiscuous mode [ 3476.245520] bond1015 (unregistering): Released all slaves [ 3476.261579] bond1014 (unregistering): Releasing active interface bridge1783 [ 3476.342670] bond1014 (unregistering): Releasing active interface bridge1782 [ 3476.349833] device bridge1782 left promiscuous mode [ 3476.443542] bond1014 (unregistering): Released all slaves [ 3476.502834] bond1013 (unregistering): Releasing active interface bridge1780 [ 3476.509976] device bridge1780 left promiscuous mode [ 3476.603247] bond1013 (unregistering): Released all slaves [ 3476.662896] bond1012 (unregistering): Releasing active interface bridge1778 [ 3476.670033] device bridge1778 left promiscuous mode [ 3476.763422] bond1012 (unregistering): Released all slaves [ 3476.779137] bond1011 (unregistering): Releasing active interface bridge1777 [ 3476.862691] bond1011 (unregistering): Releasing active interface bridge1776 [ 3476.869818] device bridge1776 left promiscuous mode [ 3476.963530] bond1011 (unregistering): Released all slaves [ 3476.979877] bond1010 (unregistering): Releasing active interface bridge1775 [ 3477.062734] bond1010 (unregistering): Releasing active interface bridge1774 [ 3477.069901] device bridge1774 left promiscuous mode [ 3477.163418] bond1010 (unregistering): Released all slaves [ 3477.179541] bond1009 (unregistering): Releasing active interface bridge1773 [ 3477.262638] bond1009 (unregistering): Releasing active interface bridge1772 [ 3477.269873] device bridge1772 left promiscuous mode [ 3477.363297] bond1009 (unregistering): Released all slaves [ 3477.378824] bond1008 (unregistering): Releasing active interface bridge1771 [ 3477.463429] bond1008 (unregistering): Releasing active interface bridge1770 [ 3477.477010] device bridge1770 left promiscuous mode [ 3477.565360] bond1008 (unregistering): Released all slaves [ 3477.581142] bond1007 (unregistering): Releasing active interface bridge1769 [ 3477.662601] bond1007 (unregistering): Releasing active interface bridge1768 [ 3477.669754] device bridge1768 left promiscuous mode [ 3477.763366] bond1007 (unregistering): Released all slaves [ 3477.778977] bond1006 (unregistering): Releasing active interface bridge1767 [ 3477.862595] bond1006 (unregistering): Releasing active interface bridge1766 [ 3477.869836] device bridge1766 left promiscuous mode [ 3477.963441] bond1006 (unregistering): Released all slaves [ 3477.979567] bond1005 (unregistering): Releasing active interface bridge1765 [ 3478.062609] bond1005 (unregistering): Releasing active interface bridge1764 [ 3478.069775] device bridge1764 left promiscuous mode [ 3478.163310] bond1005 (unregistering): Released all slaves [ 3478.179100] bond1004 (unregistering): Releasing active interface bridge1763 [ 3478.262695] bond1004 (unregistering): Releasing active interface bridge1762 [ 3478.269852] device bridge1762 left promiscuous mode [ 3478.363339] bond1004 (unregistering): Released all slaves [ 3478.379826] bond1003 (unregistering): Releasing active interface bridge1761 [ 3478.462923] bond1003 (unregistering): Releasing active interface bridge1760 [ 3478.470080] device bridge1760 left promiscuous mode [ 3478.563295] bond1003 (unregistering): Released all slaves [ 3478.579232] bond1002 (unregistering): Releasing active interface bridge1759 [ 3478.662500] bond1002 (unregistering): Releasing active interface bridge1758 [ 3478.669749] device bridge1758 left promiscuous mode [ 3478.764054] bond1002 (unregistering): Released all slaves [ 3478.779564] bond1001 (unregistering): Releasing active interface bridge1757 [ 3478.862760] bond1001 (unregistering): Releasing active interface bridge1756 [ 3478.869914] device bridge1756 left promiscuous mode [ 3478.965194] bond1001 (unregistering): Released all slaves [ 3479.023567] bond1000 (unregistering): Releasing active interface bridge1754 [ 3479.036326] device bridge1754 left promiscuous mode [ 3479.123291] bond1000 (unregistering): Released all slaves [ 3479.138922] bond999 (unregistering): Releasing active interface bridge1753 [ 3479.222687] bond999 (unregistering): Releasing active interface bridge1752 [ 3479.229752] device bridge1752 left promiscuous mode [ 3479.323459] bond999 (unregistering): Released all slaves [ 3479.339061] bond998 (unregistering): Releasing active interface bridge1751 [ 3479.422597] bond998 (unregistering): Releasing active interface bridge1750 [ 3479.429658] device bridge1750 left promiscuous mode [ 3479.523717] bond998 (unregistering): Released all slaves [ 3479.539591] bond997 (unregistering): Releasing active interface bridge1749 [ 3479.632619] bond997 (unregistering): Releasing active interface bridge1748 [ 3479.639673] device bridge1748 left promiscuous mode [ 3479.733453] bond997 (unregistering): Released all slaves [ 3479.749190] bond996 (unregistering): Releasing active interface bridge1747 [ 3479.842648] bond996 (unregistering): Releasing active interface bridge1746 [ 3479.849708] device bridge1746 left promiscuous mode [ 3479.943281] bond996 (unregistering): Released all slaves [ 3479.961553] bond995 (unregistering): Releasing active interface bridge1745 [ 3480.042787] bond995 (unregistering): Releasing active interface bridge1744 [ 3480.049858] device bridge1744 left promiscuous mode [ 3480.143508] bond995 (unregistering): Released all slaves [ 3480.159430] bond994 (unregistering): Releasing active interface bridge1743 [ 3480.242602] bond994 (unregistering): Releasing active interface bridge1742 [ 3480.249652] device bridge1742 left promiscuous mode [ 3480.345693] bond994 (unregistering): Released all slaves [ 3480.361762] bond993 (unregistering): Releasing active interface bridge1741 [ 3480.442601] bond993 (unregistering): Releasing active interface bridge1740 [ 3480.449653] device bridge1740 left promiscuous mode [ 3480.543360] bond993 (unregistering): Released all slaves [ 3480.559164] bond992 (unregistering): Releasing active interface bridge1739 [ 3480.642888] bond992 (unregistering): Releasing active interface bridge1738 [ 3480.649955] device bridge1738 left promiscuous mode [ 3480.743452] bond992 (unregistering): Released all slaves [ 3480.763386] bond991 (unregistering): Releasing active interface bridge1737 [ 3480.872717] bond991 (unregistering): Releasing active interface bridge1736 [ 3480.879767] device bridge1736 left promiscuous mode [ 3480.983256] bond991 (unregistering): Released all slaves [ 3480.999842] bond990 (unregistering): Releasing active interface bridge1735 [ 3481.006983] device bridge1735 left promiscuous mode [ 3481.104131] bond990 (unregistering): Released all slaves [ 3481.119900] bond989 (unregistering): Releasing active interface bridge1734 [ 3481.202759] bond989 (unregistering): Releasing active interface bridge1733 [ 3481.210105] device bridge1733 left promiscuous mode [ 3481.303301] bond989 (unregistering): Released all slaves [ 3481.320784] bond988 (unregistering): Releasing active interface bridge1732 [ 3481.402660] bond988 (unregistering): Releasing active interface bridge1731 [ 3481.409849] device bridge1731 left promiscuous mode [ 3481.503411] bond988 (unregistering): Released all slaves [ 3481.519002] bond987 (unregistering): Releasing active interface bridge1730 [ 3481.602563] bond987 (unregistering): Releasing active interface bridge1729 [ 3481.609629] device bridge1729 left promiscuous mode [ 3481.703528] bond987 (unregistering): Released all slaves [ 3481.721424] bond986 (unregistering): Releasing active interface bridge1728 [ 3481.802530] bond986 (unregistering): Releasing active interface bridge1727 [ 3481.809610] device bridge1727 left promiscuous mode [ 3481.903624] bond986 (unregistering): Released all slaves [ 3481.919816] bond985 (unregistering): Releasing active interface bridge1726 [ 3482.013573] bond985 (unregistering): Releasing active interface bridge1725 [ 3482.026076] device bridge1725 left promiscuous mode [ 3482.113601] bond985 (unregistering): Released all slaves [ 3482.129540] bond984 (unregistering): Releasing active interface bridge1724 [ 3482.212591] bond984 (unregistering): Releasing active interface bridge1723 [ 3482.219683] device bridge1723 left promiscuous mode [ 3482.313583] bond984 (unregistering): Released all slaves [ 3482.382546] bond983 (unregistering): Releasing active interface bridge1721 [ 3482.389618] device bridge1721 left promiscuous mode [ 3482.483480] bond983 (unregistering): Released all slaves [ 3482.499286] bond982 (unregistering): Releasing active interface bridge1720 [ 3482.582464] bond982 (unregistering): Releasing active interface bridge1719 [ 3482.589533] device bridge1719 left promiscuous mode [ 3482.683417] bond982 (unregistering): Released all slaves [ 3482.699396] bond981 (unregistering): Releasing active interface bridge1718 [ 3482.782720] bond981 (unregistering): Releasing active interface bridge1717 [ 3482.789798] device bridge1717 left promiscuous mode [ 3482.883416] bond981 (unregistering): Released all slaves [ 3482.899093] bond980 (unregistering): Releasing active interface bridge1716 [ 3482.982760] bond980 (unregistering): Releasing active interface bridge1715 [ 3482.989830] device bridge1715 left promiscuous mode [ 3483.083267] bond980 (unregistering): Released all slaves [ 3483.142694] bond979 (unregistering): Releasing active interface bridge1713 [ 3483.149760] device bridge1713 left promiscuous mode [ 3483.243213] bond979 (unregistering): Released all slaves [ 3483.258876] bond978 (unregistering): Releasing active interface bridge1712 [ 3483.342738] bond978 (unregistering): Releasing active interface bridge1711 [ 3483.349803] device bridge1711 left promiscuous mode [ 3483.444006] bond978 (unregistering): Released all slaves [ 3483.459901] bond977 (unregistering): Releasing active interface bridge1710 [ 3483.542838] bond977 (unregistering): Releasing active interface bridge1709 [ 3483.550018] device bridge1709 left promiscuous mode [ 3483.643375] bond977 (unregistering): Released all slaves [ 3483.659515] bond976 (unregistering): Releasing active interface bridge1708 [ 3483.742665] bond976 (unregistering): Releasing active interface bridge1707 [ 3483.749744] device bridge1707 left promiscuous mode [ 3483.843356] bond976 (unregistering): Released all slaves [ 3483.902788] bond975 (unregistering): Releasing active interface bridge1705 [ 3483.909854] device bridge1705 left promiscuous mode [ 3484.003510] bond975 (unregistering): Released all slaves [ 3484.019128] bond974 (unregistering): Releasing active interface bridge1704 [ 3484.102674] bond974 (unregistering): Releasing active interface bridge1703 [ 3484.109761] device bridge1703 left promiscuous mode [ 3484.203341] bond974 (unregistering): Released all slaves [ 3484.219581] bond973 (unregistering): Releasing active interface bridge1702 [ 3484.302763] bond973 (unregistering): Releasing active interface bridge1701 [ 3484.309826] device bridge1701 left promiscuous mode [ 3484.403544] bond973 (unregistering): Released all slaves [ 3484.419608] bond972 (unregistering): Releasing active interface bridge1700 [ 3484.502748] bond972 (unregistering): Releasing active interface bridge1699 [ 3484.509808] device bridge1699 left promiscuous mode [ 3484.603537] bond972 (unregistering): Released all slaves [ 3484.620602] bond971 (unregistering): Releasing active interface bridge1698 [ 3484.702651] bond971 (unregistering): Releasing active interface bridge1697 [ 3484.709720] device bridge1697 left promiscuous mode [ 3484.803421] bond971 (unregistering): Released all slaves [ 3484.819188] bond970 (unregistering): Releasing active interface bridge1696 [ 3484.912703] bond970 (unregistering): Releasing active interface bridge1695 [ 3484.919776] device bridge1695 left promiscuous mode [ 3485.013314] bond970 (unregistering): Released all slaves [ 3485.029849] bond969 (unregistering): Released all slaves [ 3485.092544] bond968 (unregistering): Releasing active interface bridge1693 [ 3485.099607] device bridge1693 left promiscuous mode [ 3485.193406] bond968 (unregistering): Released all slaves [ 3485.209537] bond967 (unregistering): Releasing active interface bridge1692 [ 3485.216644] device bridge1692 left promiscuous mode [ 3485.313387] bond967 (unregistering): Released all slaves [ 3485.330135] bond966 (unregistering): Releasing active interface bridge1691 [ 3485.412709] bond966 (unregistering): Releasing active interface bridge1690 [ 3485.419776] device bridge1690 left promiscuous mode [ 3485.513471] bond966 (unregistering): Released all slaves [ 3485.530491] bond965 (unregistering): Releasing active interface bridge1689 [ 3485.622792] bond965 (unregistering): Releasing active interface bridge1688 [ 3485.629859] device bridge1688 left promiscuous mode [ 3485.723405] bond965 (unregistering): Released all slaves [ 3485.739268] bond964 (unregistering): Releasing active interface bridge1687 [ 3485.822703] bond964 (unregistering): Releasing active interface bridge1686 [ 3485.829767] device bridge1686 left promiscuous mode [ 3485.923377] bond964 (unregistering): Released all slaves [ 3485.939665] bond963 (unregistering): Releasing active interface bridge1685 [ 3486.022664] bond963 (unregistering): Releasing active interface bridge1684 [ 3486.029722] device bridge1684 left promiscuous mode [ 3486.123271] bond963 (unregistering): Released all slaves [ 3486.138790] bond962 (unregistering): Releasing active interface bridge1683 [ 3486.222661] bond962 (unregistering): Releasing active interface bridge1682 [ 3486.229809] device bridge1682 left promiscuous mode [ 3486.323228] bond962 (unregistering): Released all slaves [ 3486.338881] bond961 (unregistering): Releasing active interface bridge1681 [ 3486.422690] bond961 (unregistering): Releasing active interface bridge1680 [ 3486.429758] device bridge1680 left promiscuous mode [ 3486.523683] bond961 (unregistering): Released all slaves [ 3486.539472] bond960 (unregistering): Releasing active interface bridge1679 [ 3486.622762] bond960 (unregistering): Releasing active interface bridge1678 [ 3486.629972] device bridge1678 left promiscuous mode [ 3486.723424] bond960 (unregistering): Released all slaves [ 3486.784407] bond959 (unregistering): Released all slaves [ 3486.800353] bond958 (unregistering): Releasing active interface bridge1676 [ 3486.807404] device bridge1676 left promiscuous mode [ 3486.903407] bond958 (unregistering): Released all slaves [ 3486.922686] bond957 (unregistering): Releasing active interface bridge1675 [ 3487.002575] bond957 (unregistering): Releasing active interface bridge1674 [ 3487.009647] device bridge1674 left promiscuous mode [ 3487.104543] bond957 (unregistering): Released all slaves [ 3487.120162] bond956 (unregistering): Releasing active interface bridge1673 [ 3487.202667] bond956 (unregistering): Releasing active interface bridge1672 [ 3487.209900] device bridge1672 left promiscuous mode [ 3487.303445] bond956 (unregistering): Released all slaves [ 3487.319358] bond955 (unregistering): Releasing active interface bridge1671 [ 3487.402654] bond955 (unregistering): Releasing active interface bridge1670 [ 3487.409718] device bridge1670 left promiscuous mode [ 3487.503413] bond955 (unregistering): Released all slaves [ 3487.519618] bond954 (unregistering): Releasing active interface bridge1669 [ 3487.602780] bond954 (unregistering): Releasing active interface bridge1668 [ 3487.609869] device bridge1668 left promiscuous mode [ 3487.703398] bond954 (unregistering): Released all slaves [ 3487.721937] bond953 (unregistering): Releasing active interface bridge1667 [ 3487.812772] bond953 (unregistering): Releasing active interface bridge1666 [ 3487.819859] device bridge1666 left promiscuous mode [ 3487.913306] bond953 (unregistering): Released all slaves [ 3487.929132] bond952 (unregistering): Releasing active interface bridge1665 [ 3488.012656] bond952 (unregistering): Releasing active interface bridge1664 [ 3488.019715] device bridge1664 left promiscuous mode [ 3488.114171] bond952 (unregistering): Released all slaves [ 3488.132463] bond951 (unregistering): Releasing active interface bridge1663 [ 3488.212619] bond951 (unregistering): Releasing active interface bridge1662 [ 3488.219674] device bridge1662 left promiscuous mode [ 3488.313769] bond951 (unregistering): Released all slaves [ 3488.329901] bond950 (unregistering): Releasing active interface bridge1661 [ 3488.412840] bond950 (unregistering): Releasing active interface bridge1660 [ 3488.420047] device bridge1660 left promiscuous mode [ 3488.515114] bond950 (unregistering): Released all slaves [ 3488.533055] bond949 (unregistering): Releasing active interface bridge1659 [ 3488.612683] bond949 (unregistering): Releasing active interface bridge1658 [ 3488.619763] device bridge1658 left promiscuous mode [ 3488.713394] bond949 (unregistering): Released all slaves [ 3488.729681] bond948 (unregistering): Releasing active interface bridge1657 [ 3488.812737] bond948 (unregistering): Releasing active interface bridge1656 [ 3488.819924] device bridge1656 left promiscuous mode [ 3488.913468] bond948 (unregistering): Released all slaves [ 3488.929843] bond947 (unregistering): Releasing active interface bridge1655 [ 3489.012615] bond947 (unregistering): Releasing active interface bridge1654 [ 3489.019687] device bridge1654 left promiscuous mode [ 3489.113484] bond947 (unregistering): Released all slaves [ 3489.128649] bond946 (unregistering): Releasing active interface bridge1653 [ 3489.212597] bond946 (unregistering): Releasing active interface bridge1652 [ 3489.219783] device bridge1652 left promiscuous mode [ 3489.313422] bond946 (unregistering): Released all slaves [ 3489.329080] bond945 (unregistering): Releasing active interface bridge1651 [ 3489.336181] device bridge1651 left promiscuous mode [ 3489.433171] bond945 (unregistering): Released all slaves [ 3489.448663] bond944 (unregistering): Releasing active interface bridge1650 [ 3489.532373] bond944 (unregistering): Releasing active interface bridge1649 [ 3489.539431] device bridge1649 left promiscuous mode [ 3489.633146] bond944 (unregistering): Released all slaves [ 3489.692791] bond943 (unregistering): Releasing active interface bridge1647 [ 3489.699856] device bridge1647 left promiscuous mode [ 3489.793408] bond943 (unregistering): Released all slaves [ 3489.810665] bond942 (unregistering): Releasing active interface bridge1646 [ 3489.892590] bond942 (unregistering): Releasing active interface bridge1645 [ 3489.899822] device bridge1645 left promiscuous mode [ 3489.993387] bond942 (unregistering): Released all slaves [ 3490.009104] bond941 (unregistering): Releasing active interface bridge1644 [ 3490.092780] bond941 (unregistering): Releasing active interface bridge1643 [ 3490.099824] device bridge1643 left promiscuous mode [ 3490.194181] bond941 (unregistering): Released all slaves [ 3490.212923] bond940 (unregistering): Releasing active interface bridge1642 [ 3490.292958] bond940 (unregistering): Releasing active interface bridge1641 [ 3490.300031] device bridge1641 left promiscuous mode [ 3490.393460] bond940 (unregistering): Released all slaves [ 3490.453439] bond939 (unregistering): Releasing active interface bridge1639 [ 3490.465934] device bridge1639 left promiscuous mode [ 3490.553268] bond939 (unregistering): Released all slaves [ 3490.568831] bond938 (unregistering): Releasing active interface bridge1638 [ 3490.652680] bond938 (unregistering): Releasing active interface bridge1637 [ 3490.659778] device bridge1637 left promiscuous mode [ 3490.753292] bond938 (unregistering): Released all slaves [ 3490.768801] bond937 (unregistering): Releasing active interface bridge1636 [ 3490.852538] bond937 (unregistering): Releasing active interface bridge1635 [ 3490.859684] device bridge1635 left promiscuous mode [ 3490.953282] bond937 (unregistering): Released all slaves [ 3490.968953] bond936 (unregistering): Releasing active interface bridge1634 [ 3491.052729] bond936 (unregistering): Releasing active interface bridge1633 [ 3491.059794] device bridge1633 left promiscuous mode [ 3491.153449] bond936 (unregistering): Released all slaves [ 3491.173298] bond935 (unregistering): Releasing active interface bridge1632 [ 3491.262868] bond935 (unregistering): Releasing active interface bridge1631 [ 3491.269946] device bridge1631 left promiscuous mode [ 3491.364131] bond935 (unregistering): Released all slaves [ 3491.379975] bond934 (unregistering): Releasing active interface bridge1630 [ 3491.462613] bond934 (unregistering): Releasing active interface bridge1629 [ 3491.469692] device bridge1629 left promiscuous mode [ 3491.563454] bond934 (unregistering): Released all slaves [ 3491.579176] bond933 (unregistering): Releasing active interface bridge1628 [ 3491.662683] bond933 (unregistering): Releasing active interface bridge1627 [ 3491.669737] device bridge1627 left promiscuous mode [ 3491.763437] bond933 (unregistering): Released all slaves [ 3491.779491] bond932 (unregistering): Releasing active interface bridge1626 [ 3491.786611] device bridge1626 left promiscuous mode [ 3491.884171] bond932 (unregistering): Released all slaves [ 3491.899815] bond931 (unregistering): Releasing active interface bridge1625 [ 3491.982729] bond931 (unregistering): Releasing active interface bridge1624 [ 3491.989767] device bridge1624 left promiscuous mode [ 3492.093313] bond931 (unregistering): Released all slaves [ 3492.109052] bond930 (unregistering): Releasing active interface bridge1623 [ 3492.193127] bond930 (unregistering): Releasing active interface bridge1622 [ 3492.200186] device bridge1622 left promiscuous mode [ 3492.293388] bond930 (unregistering): Released all slaves [ 3492.309575] bond929 (unregistering): Releasing active interface bridge1621 [ 3492.316771] device bridge1621 left promiscuous mode [ 3492.393158] bond929 (unregistering): Released all slaves [ 3492.409886] bond928 (unregistering): Releasing active interface bridge1620 [ 3492.492600] bond928 (unregistering): Releasing active interface bridge1619 [ 3492.499691] device bridge1619 left promiscuous mode [ 3492.595090] bond928 (unregistering): Released all slaves [ 3492.611848] bond927 (unregistering): Releasing active interface bridge1618 [ 3492.692691] bond927 (unregistering): Releasing active interface bridge1617 [ 3492.699769] device bridge1617 left promiscuous mode [ 3492.794192] bond927 (unregistering): Released all slaves [ 3492.810702] bond926 (unregistering): Releasing active interface bridge1616 [ 3492.892713] bond926 (unregistering): Releasing active interface bridge1615 [ 3492.899808] device bridge1615 left promiscuous mode [ 3492.993473] bond926 (unregistering): Released all slaves [ 3493.011831] bond925 (unregistering): Releasing active interface bridge1614 [ 3493.093102] bond925 (unregistering): Releasing active interface bridge1613 [ 3493.100195] device bridge1613 left promiscuous mode [ 3493.193761] bond925 (unregistering): Released all slaves [ 3493.210155] bond924 (unregistering): Releasing active interface bridge1612 [ 3493.292658] bond924 (unregistering): Releasing active interface bridge1611 [ 3493.299739] device bridge1611 left promiscuous mode [ 3493.393607] bond924 (unregistering): Released all slaves [ 3493.409556] bond923 (unregistering): Releasing active interface bridge1610 [ 3493.492576] bond923 (unregistering): Releasing active interface bridge1609 [ 3493.499653] device bridge1609 left promiscuous mode [ 3493.593521] bond923 (unregistering): Released all slaves [ 3493.652816] bond922 (unregistering): Releasing active interface bridge1607 [ 3493.659886] device bridge1607 left promiscuous mode [ 3493.753409] bond922 (unregistering): Released all slaves [ 3493.768981] bond921 (unregistering): Releasing active interface bridge1606 [ 3493.862220] bond921 (unregistering): Releasing active interface bridge1605 [ 3493.869285] device bridge1605 left promiscuous mode [ 3493.953531] bond921 (unregistering): Released all slaves [ 3493.970031] bond920 (unregistering): Releasing active interface bridge1604 [ 3494.052631] bond920 (unregistering): Releasing active interface bridge1603 [ 3494.059704] device bridge1603 left promiscuous mode [ 3494.153620] bond920 (unregistering): Released all slaves [ 3494.169785] bond919 (unregistering): Releasing active interface bridge1602 [ 3494.252628] bond919 (unregistering): Releasing active interface bridge1601 [ 3494.259692] device bridge1601 left promiscuous mode [ 3494.353391] bond919 (unregistering): Released all slaves [ 3494.371064] bond918 (unregistering): Releasing active interface bridge1600 [ 3494.452762] bond918 (unregistering): Releasing active interface bridge1599 [ 3494.459831] device bridge1599 left promiscuous mode [ 3494.553438] bond918 (unregistering): Released all slaves [ 3494.569308] bond917 (unregistering): Releasing active interface bridge1598 [ 3494.652607] bond917 (unregistering): Releasing active interface bridge1597 [ 3494.659672] device bridge1597 left promiscuous mode [ 3494.753411] bond917 (unregistering): Released all slaves [ 3494.769091] bond916 (unregistering): Releasing active interface bridge1596 [ 3494.852553] bond916 (unregistering): Releasing active interface bridge1595 [ 3494.859648] device bridge1595 left promiscuous mode [ 3494.953427] bond916 (unregistering): Released all slaves [ 3494.969262] bond915 (unregistering): Releasing active interface bridge1594 [ 3495.062722] bond915 (unregistering): Releasing active interface bridge1593 [ 3495.069784] device bridge1593 left promiscuous mode [ 3495.163339] bond915 (unregistering): Released all slaves [ 3495.179177] bond914 (unregistering): Releasing active interface bridge1592 [ 3495.272735] bond914 (unregistering): Releasing active interface bridge1591 [ 3495.279797] device bridge1591 left promiscuous mode [ 3495.373255] bond914 (unregistering): Released all slaves [ 3495.389062] bond913 (unregistering): Releasing active interface bridge1590 [ 3495.472602] bond913 (unregistering): Releasing active interface bridge1589 [ 3495.479666] device bridge1589 left promiscuous mode [ 3495.573304] bond913 (unregistering): Released all slaves [ 3495.589076] bond912 (unregistering): Releasing active interface bridge1588 [ 3495.672573] bond912 (unregistering): Releasing active interface bridge1587 [ 3495.679637] device bridge1587 left promiscuous mode [ 3495.773554] bond912 (unregistering): Released all slaves [ 3495.789433] bond911 (unregistering): Releasing active interface bridge1586 [ 3495.872607] bond911 (unregistering): Releasing active interface bridge1585 [ 3495.879670] device bridge1585 left promiscuous mode [ 3495.973400] bond911 (unregistering): Released all slaves [ 3495.989267] bond910 (unregistering): Releasing active interface bridge1584 [ 3496.072548] bond910 (unregistering): Releasing active interface bridge1583 [ 3496.079613] device bridge1583 left promiscuous mode [ 3496.173376] bond910 (unregistering): Released all slaves [ 3496.233384] bond909 (unregistering): Released all slaves [ 3496.249215] bond908 (unregistering): Releasing active interface bridge1581 [ 3496.256323] device bridge1581 left promiscuous mode [ 3496.353390] bond908 (unregistering): Released all slaves [ 3496.373273] bond907 (unregistering): Releasing active interface bridge1580 [ 3496.482674] bond907 (unregistering): Releasing active interface bridge1579 [ 3496.489740] device bridge1579 left promiscuous mode [ 3496.583368] bond907 (unregistering): Released all slaves [ 3496.599512] bond906 (unregistering): Releasing active interface bridge1578 [ 3496.682550] bond906 (unregistering): Releasing active interface bridge1577 [ 3496.689613] device bridge1577 left promiscuous mode [ 3496.783424] bond906 (unregistering): Released all slaves [ 3496.799273] bond905 (unregistering): Releasing active interface bridge1576 [ 3496.902489] bond905 (unregistering): Releasing active interface bridge1575 [ 3496.909558] device bridge1575 left promiscuous mode [ 3497.003287] bond905 (unregistering): Released all slaves [ 3497.019202] bond904 (unregistering): Releasing active interface bridge1574 [ 3497.102654] bond904 (unregistering): Releasing active interface bridge1573 [ 3497.109712] device bridge1573 left promiscuous mode [ 3497.203385] bond904 (unregistering): Released all slaves [ 3497.219373] bond903 (unregistering): Releasing active interface bridge1572 [ 3497.314461] bond903 (unregistering): Releasing active interface bridge1571 [ 3497.329300] device bridge1571 left promiscuous mode [ 3497.413594] bond903 (unregistering): Released all slaves [ 3497.429497] bond902 (unregistering): Releasing active interface bridge1570 [ 3497.512539] bond902 (unregistering): Releasing active interface bridge1569 [ 3497.519609] device bridge1569 left promiscuous mode [ 3497.613220] bond902 (unregistering): Released all slaves [ 3497.628830] bond901 (unregistering): Releasing active interface bridge1568 [ 3497.712610] bond901 (unregistering): Releasing active interface bridge1567 [ 3497.719674] device bridge1567 left promiscuous mode [ 3497.813376] bond901 (unregistering): Released all slaves [ 3497.829173] bond900 (unregistering): Releasing active interface bridge1566 [ 3497.912641] bond900 (unregistering): Releasing active interface bridge1565 [ 3497.919725] device bridge1565 left promiscuous mode [ 3498.013354] bond900 (unregistering): Released all slaves [ 3498.029113] bond899 (unregistering): Releasing active interface bridge1564 [ 3498.112666] bond899 (unregistering): Releasing active interface bridge1563 [ 3498.119727] device bridge1563 left promiscuous mode [ 3498.213408] bond899 (unregistering): Released all slaves [ 3498.229246] bond898 (unregistering): Releasing active interface bridge1562 [ 3498.312555] bond898 (unregistering): Releasing active interface bridge1561 [ 3498.319621] device bridge1561 left promiscuous mode [ 3498.413388] bond898 (unregistering): Released all slaves [ 3498.429492] bond897 (unregistering): Releasing active interface bridge1560 [ 3498.532571] bond897 (unregistering): Releasing active interface bridge1559 [ 3498.539633] device bridge1559 left promiscuous mode [ 3498.633394] bond897 (unregistering): Released all slaves [ 3498.649188] bond896 (unregistering): Releasing active interface bridge1558 [ 3498.734710] bond896 (unregistering): Releasing active interface bridge1557 [ 3498.747196] device bridge1557 left promiscuous mode [ 3498.833184] bond896 (unregistering): Released all slaves [ 3498.893590] bond895 (unregistering): Released all slaves [ 3498.909474] bond894 (unregistering): Releasing active interface bridge1555 [ 3498.916587] device bridge1555 left promiscuous mode [ 3499.013156] bond894 (unregistering): Released all slaves [ 3499.028756] bond893 (unregistering): Releasing active interface bridge1554 [ 3499.112634] bond893 (unregistering): Releasing active interface bridge1553 [ 3499.119692] device bridge1553 left promiscuous mode [ 3499.213321] bond893 (unregistering): Released all slaves [ 3499.229210] bond892 (unregistering): Releasing active interface bridge1552 [ 3499.312615] bond892 (unregistering): Releasing active interface bridge1551 [ 3499.319673] device bridge1551 left promiscuous mode [ 3499.413326] bond892 (unregistering): Released all slaves [ 3499.429018] bond891 (unregistering): Releasing active interface bridge1550 [ 3499.512549] bond891 (unregistering): Releasing active interface bridge1549 [ 3499.519697] device bridge1549 left promiscuous mode [ 3499.613340] bond891 (unregistering): Released all slaves [ 3499.628723] bond890 (unregistering): Releasing active interface bridge1548 [ 3499.712534] bond890 (unregistering): Releasing active interface bridge1547 [ 3499.719600] device bridge1547 left promiscuous mode [ 3499.813266] bond890 (unregistering): Released all slaves [ 3499.823588] bond889 (unregistering): Releasing active interface bridge1546 [ 3499.902492] bond889 (unregistering): Releasing active interface bridge1545 [ 3499.909547] device bridge1545 left promiscuous mode [ 3500.003175] bond889 (unregistering): Released all slaves [ 3500.018787] bond888 (unregistering): Releasing active interface bridge1544 [ 3500.102545] bond888 (unregistering): Releasing active interface bridge1543 [ 3500.109612] device bridge1543 left promiscuous mode [ 3500.203184] bond888 (unregistering): Released all slaves [ 3500.215819] bond887 (unregistering): Releasing active interface bridge1542 [ 3500.226665] device bridge1542 left promiscuous mode [ 3500.323303] bond887 (unregistering): Released all slaves [ 3500.339455] bond886 (unregistering): Releasing active interface bridge1541 [ 3500.422505] bond886 (unregistering): Releasing active interface bridge1540 [ 3500.429569] device bridge1540 left promiscuous mode [ 3500.523086] bond886 (unregistering): Released all slaves [ 3500.538887] bond885 (unregistering): Releasing active interface bridge1539 [ 3500.622448] bond885 (unregistering): Releasing active interface bridge1538 [ 3500.629506] device bridge1538 left promiscuous mode [ 3500.723304] bond885 (unregistering): Released all slaves [ 3500.739303] bond884 (unregistering): Releasing active interface bridge1537 [ 3500.822563] bond884 (unregistering): Releasing active interface bridge1536 [ 3500.829616] device bridge1536 left promiscuous mode [ 3500.923238] bond884 (unregistering): Released all slaves [ 3500.983341] bond883 (unregistering): Released all slaves [ 3500.998679] bond882 (unregistering): Releasing active interface bridge1534 [ 3501.005858] device bridge1534 left promiscuous mode [ 3501.103374] bond882 (unregistering): Released all slaves [ 3501.119094] bond881 (unregistering): Releasing active interface bridge1533 [ 3501.202487] bond881 (unregistering): Releasing active interface bridge1532 [ 3501.209717] device bridge1532 left promiscuous mode [ 3501.303228] bond881 (unregistering): Released all slaves [ 3501.321346] bond880 (unregistering): Releasing active interface bridge1531 [ 3501.402566] bond880 (unregistering): Releasing active interface bridge1530 [ 3501.409625] device bridge1530 left promiscuous mode [ 3501.503138] bond880 (unregistering): Released all slaves [ 3501.518556] bond879 (unregistering): Releasing active interface bridge1529 [ 3501.602446] bond879 (unregistering): Releasing active interface bridge1528 [ 3501.609516] device bridge1528 left promiscuous mode [ 3501.703224] bond879 (unregistering): Released all slaves [ 3501.719004] bond878 (unregistering): Releasing active interface bridge1527 [ 3501.802749] bond878 (unregistering): Releasing active interface bridge1526 [ 3501.809824] device bridge1526 left promiscuous mode [ 3501.903154] bond878 (unregistering): Released all slaves [ 3501.919451] bond877 (unregistering): Releasing active interface bridge1525 [ 3502.002588] bond877 (unregistering): Releasing active interface bridge1524 [ 3502.009664] device bridge1524 left promiscuous mode [ 3502.103005] bond877 (unregistering): Released all slaves [ 3502.122513] bond876 (unregistering): Releasing active interface bridge1523 [ 3502.212635] bond876 (unregistering): Releasing active interface bridge1522 [ 3502.219702] device bridge1522 left promiscuous mode [ 3502.313211] bond876 (unregistering): Released all slaves [ 3502.328466] bond875 (unregistering): Releasing active interface bridge1521 [ 3502.412558] bond875 (unregistering): Releasing active interface bridge1520 [ 3502.419627] device bridge1520 left promiscuous mode [ 3502.513303] bond875 (unregistering): Released all slaves [ 3502.530670] bond874 (unregistering): Releasing active interface bridge1519 [ 3502.612371] bond874 (unregistering): Releasing active interface bridge1518 [ 3502.619512] device bridge1518 left promiscuous mode [ 3502.723270] bond874 (unregistering): Released all slaves [ 3502.738883] bond873 (unregistering): Releasing active interface bridge1517 [ 3502.822641] bond873 (unregistering): Releasing active interface bridge1516 [ 3502.829709] device bridge1516 left promiscuous mode [ 3502.924103] bond873 (unregistering): Released all slaves [ 3502.939577] bond872 (unregistering): Releasing active interface bridge1515 [ 3503.022512] bond872 (unregistering): Releasing active interface bridge1514 [ 3503.029594] device bridge1514 left promiscuous mode [ 3503.123214] bond872 (unregistering): Released all slaves [ 3503.138486] bond871 (unregistering): Releasing active interface bridge1513 [ 3503.222561] bond871 (unregistering): Releasing active interface bridge1512 [ 3503.229631] device bridge1512 left promiscuous mode [ 3503.323458] bond871 (unregistering): Released all slaves [ 3503.383474] bond870 (unregistering): Released all slaves [ 3503.401424] bond869 (unregistering): Releasing active interface bridge1510 [ 3503.408483] device bridge1510 left promiscuous mode [ 3503.503163] bond869 (unregistering): Released all slaves [ 3503.518399] bond868 (unregistering): Releasing active interface bridge1509 [ 3503.614203] bond868 (unregistering): Releasing active interface bridge1508 [ 3503.621363] device bridge1508 left promiscuous mode [ 3503.713361] bond868 (unregistering): Released all slaves [ 3503.731177] bond867 (unregistering): Releasing active interface bridge1507 [ 3503.812641] bond867 (unregistering): Releasing active interface bridge1506 [ 3503.819910] device bridge1506 left promiscuous mode [ 3503.923509] bond867 (unregistering): Released all slaves [ 3503.939535] bond866 (unregistering): Releasing active interface bridge1505 [ 3504.022601] bond866 (unregistering): Releasing active interface bridge1504 [ 3504.029668] device bridge1504 left promiscuous mode [ 3504.035200] INFO: task kworker/0:2:18439 blocked for more than 140 seconds. [ 3504.048900] Not tainted 4.19.108-syzkaller #0 [ 3504.054466] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3504.068738] kworker/0:2 D26616 18439 2 0x80000000 [ 3504.074838] Workqueue: events switchdev_deferred_process_work [ 3504.086537] Call Trace: [ 3504.089170] ? __schedule+0x866/0x1d80 [ 3504.094298] ? __mutex_lock+0x721/0x1300 [ 3504.098380] ? firmware_map_remove+0x19a/0x19a [ 3504.108710] ? lock_downgrade+0x740/0x740 [ 3504.113219] schedule+0x8d/0x1b0 [ 3504.116598] schedule_preempt_disabled+0xf/0x20 [ 3504.126944] __mutex_lock+0x726/0x1300 [ 3504.131227] ? lock_downgrade+0x740/0x740 [ 3504.135391] ? switchdev_deferred_process_work+0xa/0x20 [ 3504.146640] ? mutex_trylock+0x1a0/0x1a0 [ 3504.151132] ? process_one_work+0x82c/0x1640 [ 3504.155583] ? __lock_is_held+0xad/0x140 [ 3504.159657] ? switchdev_deferred_process_work+0xa/0x20 [ 3504.170879] ? rtnl_lock+0x5/0x20 [ 3504.174467] switchdev_deferred_process_work+0xa/0x20 [ 3504.179666] process_one_work+0x91f/0x1640 [ 3504.188519] ? pwq_dec_nr_in_flight+0x310/0x310 [ 3504.196717] worker_thread+0x96/0xe20 [ 3504.205225] ? process_one_work+0x1640/0x1640 [ 3504.209859] kthread+0x34a/0x420 [ 3504.214291] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3504.219859] ret_from_fork+0x24/0x30 [ 3504.229687] INFO: task kworker/1:0:12440 blocked for more than 140 seconds. [ 3504.237834] Not tainted 4.19.108-syzkaller #0 [ 3504.247257] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3504.256284] kworker/1:0 D26720 12440 2 0x80000000 [ 3504.266408] Workqueue: events linkwatch_event [ 3504.271925] Call Trace: [ 3504.274535] ? __schedule+0x866/0x1d80 [ 3504.278445] ? __mutex_lock+0x721/0x1300 [ 3504.287307] ? firmware_map_remove+0x19a/0x19a [ 3504.292994] ? lock_downgrade+0x740/0x740 [ 3504.297187] schedule+0x8d/0x1b0 [ 3504.305207] schedule_preempt_disabled+0xf/0x20 [ 3504.309893] __mutex_lock+0x726/0x1300 [ 3504.314845] ? lock_downgrade+0x740/0x740 [ 3504.319008] ? linkwatch_event+0xb/0x60 [ 3504.327544] ? mutex_trylock+0x1a0/0x1a0 [ 3504.332651] ? process_one_work+0x82c/0x1640 [ 3504.337198] ? __lock_is_held+0xad/0x140 [ 3504.345901] ? linkwatch_event+0xb/0x60 [ 3504.349904] linkwatch_event+0xb/0x60 [ 3504.355673] process_one_work+0x91f/0x1640 [ 3504.359942] ? pwq_dec_nr_in_flight+0x310/0x310 [ 3504.369359] worker_thread+0x96/0xe20 [ 3504.374405] ? process_one_work+0x1640/0x1640 [ 3504.378929] kthread+0x34a/0x420 [ 3504.386973] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3504.393607] ret_from_fork+0x24/0x30 [ 3504.397397] INFO: task syz-executor.0:18715 blocked for more than 140 seconds. [ 3504.413145] Not tainted 4.19.108-syzkaller #0 [ 3504.418191] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3504.434875] syz-executor.0 D24400 18715 1 0x00000004 [ 3504.444347] Call Trace: [ 3504.446979] ? __schedule+0x866/0x1d80 [ 3504.452889] ? __mutex_lock+0x721/0x1300 [ 3504.456984] ? firmware_map_remove+0x19a/0x19a [ 3504.465339] ? lock_downgrade+0x740/0x740 [ 3504.469527] schedule+0x8d/0x1b0 [ 3504.474848] schedule_preempt_disabled+0xf/0x20 [ 3504.479536] __mutex_lock+0x726/0x1300 [ 3504.487883] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 3504.494526] ? mutex_trylock+0x1a0/0x1a0 [ 3504.498611] ? rtnetlink_rcv_msg+0x3c3/0xaf0 [ 3504.506755] ? lock_downgrade+0x740/0x740 [ 3504.514019] ? check_preemption_disabled+0x41/0x280 [ 3504.519074] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 3504.527244] rtnetlink_rcv_msg+0x3fe/0xaf0 [ 3504.533401] ? rtnetlink_put_metrics+0x520/0x520 [ 3504.538185] ? find_held_lock+0x2d/0x110 [ 3504.545980] netlink_rcv_skb+0x160/0x410 [ 3504.550064] ? rtnetlink_put_metrics+0x520/0x520 [ 3504.556784] ? netlink_ack+0xa60/0xa60 [ 3504.564371] netlink_unicast+0x4d7/0x6a0 [ 3504.568455] ? netlink_attachskb+0x710/0x710 [ 3504.574828] netlink_sendmsg+0x80b/0xcd0 [ 3504.578907] ? netlink_unicast+0x6a0/0x6a0 [ 3504.587041] ? netlink_unicast+0x6a0/0x6a0 [ 3504.593064] sock_sendmsg+0xcf/0x120 [ 3504.596803] __sys_sendto+0x21a/0x330 [ 3504.606078] ? __ia32_sys_getpeername+0xb0/0xb0 [ 3504.613455] ? __fd_install+0x1b4/0x610 [ 3504.617464] ? __fd_install+0x1eb/0x610 [ 3504.625010] ? __sys_socket+0x16d/0x200 [ 3504.629001] ? move_addr_to_kernel+0x70/0x70 [ 3504.635327] ? _raw_spin_unlock_irq+0x5a/0x80 [ 3504.639845] ? task_work_run+0x11c/0x1b0 [ 3504.647621] __x64_sys_sendto+0xdd/0x1b0 [ 3504.653683] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 3504.658282] do_syscall_64+0xf9/0x620 [ 3504.665939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3504.673421] RIP: 0033:0x4161a3 [ 3504.676638] Code: 90 90 90 90 90 90 90 48 83 ec 08 48 8b 05 55 1e 24 00 89 f9 48 8d 15 cc df 02 00 49 89 f0 be 01 00 00 00 48 8b 38 31 c0 e8 6a <56> ff ff 31 c0 48 83 c4 08 c3 0f 1f 00 48 8b 05 91 1a 24 00 48 89 [ 3504.705205] RSP: 002b:00007ffeb9fcce38 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3504.713110] RAX: ffffffffffffffda RBX: 0000000000c82200 RCX: 00000000004161a3 [ 3504.725943] RDX: 000000000000003c RSI: 0000000000c82250 RDI: 0000000000000003 [ 3504.733439] RBP: 0000000000000000 R08: 00007ffeb9fcce40 R09: 000000000000000c [ 3504.746874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3504.756592] R13: 0000000000000000 R14: 0000000000c82250 R15: 0000000000000003 [ 3504.769187] [ 3504.769187] Showing all locks held in the system: [ 3504.775710] 1 lock held by khungtaskd/1073: [ 3504.780028] #0: 00000000bce85cff (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 3504.794290] 1 lock held by rsyslogd/8034: [ 3504.798434] #0: 00000000d42a6884 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xe3/0x100 [ 3504.807414] 2 locks held by getty/8159: [ 3504.815930] #0: 000000000b61a8dd (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.825501] #1: 00000000a897ce94 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.841993] 2 locks held by getty/8160: [ 3504.846004] #0: 00000000798c0435 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.859039] #1: 000000009811c17c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.868938] 2 locks held by getty/8161: [ 3504.878334] #0: 000000007a5dd351 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.888038] #1: 00000000e18da6f1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.900324] 2 locks held by getty/8162: [ 3504.904317] #0: 0000000066ad54ce (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.913354] #1: 000000002f9c18da (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.922548] 2 locks held by getty/8163: [ 3504.926522] #0: 0000000004366b28 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.935349] #1: 000000005cc98b8a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.944558] 2 locks held by getty/8164: [ 3504.948529] #0: 00000000dbffcc96 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.957378] #1: 00000000dfa9037b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.966582] 2 locks held by getty/24230: [ 3504.970941] #0: 00000000246904bb (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 3504.979453] #1: 00000000dc8b1458 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1a50 [ 3504.988857] 4 locks held by kworker/u4:7/557: [ 3504.993691] #0: 000000005da903b2 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x81a/0x1640 [ 3505.003637] #1: 00000000ffc7563e (net_cleanup_work){+.+.}, at: process_one_work+0x84e/0x1640 [ 3505.012604] #2: 00000000f8dfdcdc (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x850 [ 3505.021256] #3: 000000003eb0f01b (rtnl_mutex){+.+.}, at: default_device_exit_batch+0xea/0x3c0 [ 3505.030153] 3 locks held by kworker/0:2/18439: [ 3505.035072] #0: 00000000149e0234 ((wq_completion)"events"){+.+.}, at: process_one_work+0x81a/0x1640 [ 3505.044709] #1: 00000000a369b5f5 (deferred_process_work){+.+.}, at: process_one_work+0x84e/0x1640 [ 3505.054230] #2: 000000003eb0f01b (rtnl_mutex){+.+.}, at: switchdev_deferred_process_work+0xa/0x20 [ 3505.063793] 3 locks held by kworker/0:3/19413: [ 3505.068376] #0: 00000000c8d005c6 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x81a/0x1640 [ 3505.079123] #1: 00000000e8001496 ((addr_chk_work).work){+.+.}, at: process_one_work+0x84e/0x1640 [ 3505.088477] #2: 000000003eb0f01b (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 [ 3505.097357] 3 locks held by kworker/1:0/12440: [ 3505.102282] #0: 00000000149e0234 ((wq_completion)"events"){+.+.}, at: process_one_work+0x81a/0x1640 [ 3505.111854] #1: 000000000da0a230 ((linkwatch_work).work){+.+.}, at: process_one_work+0x84e/0x1640 [ 3505.121344] #2: 000000003eb0f01b (rtnl_mutex){+.+.}, at: linkwatch_event+0xb/0x60 [ 3505.134877] 1 lock held by syz-executor.0/18715: [ 3505.139632] #0: 000000003eb0f01b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xaf0 [ 3505.148199] [ 3505.149833] ============================================= [ 3505.149833] [ 3505.155202] bond866 (unregistering): Released all slaves [ 3505.157278] NMI backtrace for cpu 1 [ 3505.166007] CPU: 1 PID: 1073 Comm: khungtaskd Not tainted 4.19.108-syzkaller #0 [ 3505.173445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.182801] Call Trace: [ 3505.185399] dump_stack+0x188/0x20d [ 3505.189057] nmi_cpu_backtrace.cold+0x63/0xa2 [ 3505.193561] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 3505.198496] nmi_trigger_cpumask_backtrace+0x1a6/0x1eb [ 3505.203781] watchdog+0x962/0xe40 [ 3505.207247] ? reset_hung_task_detector+0x30/0x30 [ 3505.212090] kthread+0x34a/0x420 [ 3505.215458] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3505.220999] ret_from_fork+0x24/0x30 [ 3505.224814] Sending NMI from CPU 1 to CPUs 0: [ 3505.224827] bond865 (unregistering): Releasing active interface bridge1503 [ 3505.230310] NMI backtrace for cpu 0 [ 3505.230317] CPU: 0 PID: 557 Comm: kworker/u4:7 Not tainted 4.19.108-syzkaller #0 [ 3505.230323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.230326] Workqueue: netns cleanup_net [ 3505.230333] RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x50 [ 3505.230345] Code: 0a 41 bc f4 ff ff ff e8 4a 1e eb ff 48 c7 05 36 e9 05 0a 00 00 00 00 e9 24 ec ff ff 90 48 8b 34 24 65 48 8b 04 25 40 ee 01 00 <65> 8b 15 ec 4a 9a 7e 81 e2 00 01 1f 00 75 2b 8b 90 d0 12 00 00 83 [ 3505.230349] RSP: 0018:ffff88803e6471a0 EFLAGS: 00000006 [ 3505.230357] RAX: ffff888097a886c0 RBX: ffffffff876b3f67 RCX: ffffffff871a3fb0 [ 3505.230362] RDX: 0000000000000030 RSI: ffffffff871a3fbe RDI: 0000000000000001 [ 3505.230367] RBP: ffff88803e6472c0 R08: ffff888097a886c0 R09: fffffbfff11710c9 [ 3505.230372] R10: fffffbfff11710c8 R11: ffffffff88b88643 R12: dffffc0000000000 [ 3505.230382] R13: ffffffff876b3f65 R14: 1ffff11007cc8e38 R15: 0000000000000030 [ 3505.230388] FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 3505.230392] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3505.230397] CR2: 0000000001b3b000 CR3: 0000000095820000 CR4: 00000000001406f0 [ 3505.230403] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3505.230408] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3505.230411] Call Trace: [ 3505.230414] format_decode+0x18e/0xad0 [ 3505.230418] ? enable_ptr_key_workfn+0x30/0x30 [ 3505.230421] ? memcpy+0x35/0x50 [ 3505.230425] vsnprintf+0x155/0x14f0 [ 3505.230428] ? pointer+0x890/0x890 [ 3505.230431] ? mark_held_locks+0xf0/0xf0 [ 3505.230434] snprintf+0xbb/0xf0 [ 3505.230438] ? vsprintf+0x30/0x30 [ 3505.230441] ? mark_held_locks+0xf0/0xf0 [ 3505.230445] print_prefix+0x27f/0x3f0 [ 3505.230448] msg_print_text+0x82/0x1c0 [ 3505.230452] console_unlock+0x370/0xfe0 [ 3505.230455] vprintk_emit+0x282/0x6e0 [ 3505.230459] vprintk_func+0x79/0x17e [ 3505.230462] printk+0xba/0xed [ 3505.230470] ? kmsg_dump_rewind_nolock+0xd9/0xd9 [ 3505.230474] __netdev_printk.cold+0x5c/0x61 [ 3505.230477] netdev_info+0xd8/0x110 [ 3505.230480] ? netdev_notice+0x110/0x110 [ 3505.230484] __bond_release_one+0x450/0x15c0 [ 3505.230487] ? rt_flush_dev+0x205/0x290 [ 3505.230491] ? bond_enslave+0x4fd0/0x4fd0 [ 3505.230494] ? mark_held_locks+0xa6/0xf0 [ 3505.230498] ? __local_bh_enable_ip+0x159/0x270 [ 3505.230502] ? __lock_is_held+0xad/0x140 [ 3505.230505] ? cpumask_next+0x3c/0x40 [ 3505.230509] bond_netdev_event+0x980/0xb00 [ 3505.230513] notifier_call_chain+0xc0/0x230 [ 3505.230517] rollback_registered_many+0x7bc/0xc40 [ 3505.230521] ? generic_xdp_install+0x3c0/0x3c0 [ 3505.230524] ? kmem_cache_free+0x218/0x260 [ 3505.230528] ? sysfs_remove_group+0xee/0x1b0 [ 3505.230532] unregister_netdevice_many.part.0+0x16/0x1e0 [ 3505.230536] default_device_exit_batch+0x2ff/0x3c0 [ 3505.230540] ? unregister_netdevice_many+0x50/0x50 [ 3505.230544] ? do_wait_intr_irq+0x270/0x270 [ 3505.230548] ? unregister_netdevice_many+0x50/0x50 [ 3505.230552] ? dev_change_net_namespace+0xb90/0xb90 [ 3505.230556] ops_exit_list.isra.0+0xef/0x140 [ 3505.230559] cleanup_net+0x3bf/0x850 [ 3505.230563] ? net_drop_ns+0x90/0x90 [ 3505.230566] ? __lock_is_held+0x40/0x140 [ 3505.230570] process_one_work+0x91f/0x1640 [ 3505.230574] ? pwq_dec_nr_in_flight+0x310/0x310 [ 3505.230577] worker_thread+0x96/0xe20 [ 3505.230581] ? process_one_work+0x1640/0x1640 [ 3505.230584] kthread+0x34a/0x420 [ 3505.230588] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3505.230592] ret_from_fork+0x24/0x30 [ 3505.233101] Kernel panic - not syncing: hung_task: blocked tasks [ 3505.578734] CPU: 1 PID: 1073 Comm: khungtaskd Not tainted 4.19.108-syzkaller #0 [ 3505.586182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3505.595537] Call Trace: [ 3505.598136] dump_stack+0x188/0x20d [ 3505.601776] panic+0x26a/0x50e [ 3505.604975] ? __warn_printk+0xf3/0xf3 [ 3505.608870] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 3505.613802] ? ___preempt_schedule+0x16/0x18 [ 3505.618214] ? watchdog+0x962/0xe40 [ 3505.621845] ? nmi_trigger_cpumask_backtrace+0x15e/0x1eb [ 3505.627303] watchdog+0x973/0xe40 [ 3505.630764] ? reset_hung_task_detector+0x30/0x30 [ 3505.635612] kthread+0x34a/0x420 [ 3505.638984] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3505.644524] ret_from_fork+0x24/0x30 [ 3505.649641] Kernel Offset: disabled [ 3505.653276] Rebooting in 86400 seconds..