0x44}}, 0x0) 00:08:33 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="24002000710045370000000000000000070000001e9ba7793620eccf50c7cded3fca63c53109b7b00e0476a2c4d8252ca3bc1ad2fb1d1a742df159b1c52f1770d1cd932a27aa4fdd10af69fb4a17d921e9bb0ffbac7d", @ANYRES32=r4, @ANYBLOB="0c0001800800010000000100"], 0x24}}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000140)={0x3, 0x1, 0x6, 0x5d, 0x3}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a59200000002000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r5, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2913.058540][T14688] IPVS: ftp: loaded support on port[0] = 21 00:08:34 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xce340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000210000", 0x1c) 00:08:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000220000", 0x1c) [ 2913.372142][T14688] lo speed is unknown, defaulting to 1000 [ 2913.389399][T14688] virt_wifi0 speed is unknown, defaulting to 1000 00:08:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2913.990524][T14727] device vlan2 entered promiscuous mode [ 2914.009480][T14727] device bond0 entered promiscuous mode [ 2914.019946][T14727] device bond_slave_0 entered promiscuous mode [ 2914.040802][T14727] device bond_slave_1 entered promiscuous mode [ 2914.059720][T14727] device bond0 left promiscuous mode [ 2914.067617][T14727] device bond_slave_0 left promiscuous mode [ 2914.080443][T14727] device bond_slave_1 left promiscuous mode [ 2914.535342][T14692] IPVS: ftp: loaded support on port[0] = 21 [ 2914.578445][T14692] lo speed is unknown, defaulting to 1000 [ 2914.623189][T14692] virt_wifi0 speed is unknown, defaulting to 1000 [ 2915.205138][T16607] tipc: TX() has been purged, node left! 00:08:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000618090120000000000008ef509913040ab65e0d76cf44ea3099500000000b0000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x105000, 0x0) r3 = socket(0x10, 0x80002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={r4, 0x87aa, 0xfffffffffffffff9, 0x1}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f00000002c0)=0x6e, 0x4) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x8, 0x803, 0x2) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000180)=r8) socket$kcm(0x2, 0x5, 0x0) 00:08:37 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000230000", 0x1c) 00:08:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xcf340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:37 executing program 4: socket$netlink(0x10, 0x3, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0xf0a, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280)=r0, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r9 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r10, @ANYBLOB='\b\x00j\x00\x00\x00\x00\x00\b\x00i'], 0x5}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r8, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x200}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r7}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0x2c}}, 0x40814) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r8, 0x402, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "01ebc844b01cbaf95094306d93"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x18, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "af6cdf88cf"}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x200000c1}, 0x4000850) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x801, 0x4000000, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x0, 0x1, [{0x0, 0x87, 0x0, 0x0, 0x8}, {0x0, 0x7, 0x0, 0x0, 0x1f000000}, {0x0, 0xb, 0x0, 0x0, 0x3}]}}]}]}, 0x3c}}, 0x800) 00:08:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340100001000050700000000c6e9ad0000000000", @ANYRES32, @ANYBLOB="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"], 0x134}}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0xc, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4044801}, 0x20000800) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0xd}], 0x492492492492805, 0x0) [ 2916.632077][T16607] tipc: TX() has been purged, node left! 00:08:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:37 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000240000", 0x1c) [ 2916.709195][T14791] device vlan2 entered promiscuous mode [ 2916.727878][T14791] device bond0 entered promiscuous mode [ 2916.739604][T14791] device bond_slave_0 entered promiscuous mode [ 2916.748326][T14791] device bond_slave_1 entered promiscuous mode 00:08:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x198, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x2, 0x1, 0x3}, 0x14}}, 0x0) splice(r0, &(0x7f0000000040)=0x42, r1, &(0x7f00000010c0)=0x1, 0x7f, 0x7) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x30, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x8, 0x2, 0x9, 0xd07}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x20000090) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x7) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001c80)={'team0\x00', 0x0}) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001a40)={&(0x7f0000001c40)=ANY=[@ANYBLOB="8bb169ef", @ANYRES16=0x0, @ANYBLOB="02002800c0000000000000000000000001410000002000170000001700000800657a683a76657468305f746f5f626174616476000000"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', r5, 0x29, 0x3f, 0x7f, 0x5, 0x59, @empty, @private1={0xfc, 0x1, [], 0x1}, 0x0, 0x20, 0x5, 0x8000}}) socketpair(0x11, 0x2, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f0000001980)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001940)={&(0x7f0000000380)=ANY=[@ANYBLOB='_\a\x00A', @ANYRES64=r5, @ANYBLOB="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"], 0x770}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000c1) socket(0x18, 0x800, 0x3) getsockname$packet(r3, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000240012800b00010067656e65766500001400028006000500000be20005000a000100000008000500", @ANYRES16, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x54}}, 0x0) [ 2916.764740][T14791] device bond0 left promiscuous mode [ 2916.777124][T14791] device bond_slave_0 left promiscuous mode [ 2916.790055][T14791] device bond_slave_1 left promiscuous mode 00:08:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2917.287011][T14802] __nla_validate_parse: 5 callbacks suppressed [ 2917.287020][T14802] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2917.342943][T14813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2917.372829][T14813] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 11 - 0 [ 2917.381389][T14813] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 11 - 0 [ 2917.390018][T14813] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 11 - 0 [ 2917.399420][T14813] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 11 - 0 [ 2917.408956][T14813] device geneve5 entered promiscuous mode [ 2917.470165][T14806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2917.492181][ C1] net_ratelimit: 414 callbacks suppressed [ 2917.492224][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:08:38 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = socket(0x10, 0x80002, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240)={0xe1, 0x3d, 0x80, 0x5, 0x5, 0x0, 0x5, 0x8, 0x2, 0x5, 0x80, 0x7f, 0xfd, 0x1}, 0xe) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2400000071004537000000000000000007000000efffe9fcb0a40416d512f7e043ce1c523e37d884523067b1457d6755ab235b9e22b63704db5fe9f3c6f6a8cb32e57b2fec67262cf6b3a3816f8158c1dd1a43e6cc3fa78945c909854daa20ff58f611b9b1ec7ee7b9f24f8c6bd6bba9d01bf2216cd84b54b69c40a2652c209f636527c256aeb37cd04c627b91096d08ec87ced76710bc47f9cd21240ad865b8e8bb90d900237f8d7a9e24a577ffdba35619db89d11f893e72156e65e156159d6e187566944d9a89160a10d8f2a6d838076f7d6cbfbabc7cf5563146", @ANYRES32=r3, @ANYBLOB="0c0001800800010000000100"], 0x24}}, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, @any, 0x26}, 0xa) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280)='wireguard\x00') bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r5, r4, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:38 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000250000", 0x1c) 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:38 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f0000000380)=ANY=[@ANYBLOB="ffbf1016441dd7c16dfead845fe70c2c469472c332ccab6a47e8cb80304476368358781b24702ad2b5d9fc363adb2351ddd773f221a54a8984dde7582bc46c178d0612783105a53f213bbf069076ef576e38a8e5f43c7a77fa2be7f921c4437461fadebe8665d235e936c73049acc2e5ed1093de867ca5aa2ce761af696ef2a0ed23db1f44b4000400000000000000a1b3e51aecc43306ebf4b175622a3582117628f362b3da2d7a49125c5c6d394885b3037f1ba79ee0c2d0dd67e294ca23c50dc65d0a9f144ac71c6fd1f40e5bd3b431fd37ddc88753b137e281fc3d1824176ca8", @ANYRES32, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESHEX], 0x5}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) connect$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x3, @private2}, 0x20) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="395c4187625c0400000000000000"], 0x14}, 0x1, 0x4c00}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r4, 0x101}, &(0x7f0000000280)=0x8) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f00000002c0)) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0xdd}}, 0x24) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) accept(r5, 0x0, &(0x7f00000001c0)) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x4000000000005cd, 0x42, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xffe5, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 00:08:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r7 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:08:38 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd0340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:38 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000260000", 0x1c) [ 2917.692478][ T5857] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x40) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x18, 0x71, 0x6bc6711ac5763745, 0x0, 0x20000000, {0x7, 0x0, 0x0, r3}}, 0x18}}, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=0xffff0000, 0x4) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}}, 0x20}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = socket$caif_stream(0x25, 0x1, 0x0) connect$caif(r5, &(0x7f0000000000)=@dbg, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') [ 2917.751057][T14842] device vlan2 entered promiscuous mode [ 2917.780098][T14842] device bond0 entered promiscuous mode [ 2917.796753][T14842] device bond_slave_0 entered promiscuous mode [ 2917.811474][T14842] device bond_slave_1 entered promiscuous mode [ 2917.837992][T14842] device bond0 left promiscuous mode 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2917.850267][T14842] device bond_slave_0 left promiscuous mode [ 2917.877002][T14842] device bond_slave_1 left promiscuous mode [ 2917.906102][T14857] IPVS: ftp: loaded support on port[0] = 21 00:08:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2918.158045][T14844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2918.199275][T14849] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2918.513981][T14857] lo speed is unknown, defaulting to 1000 [ 2918.522101][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2918.548913][T14853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92", @ANYBLOB="48fa499e2b7266430975f04990c3574318133dc9392bdcf94c343f11ec9719ebf5b87e96125763dd9b498edb78bf66ecbc910e0b70a939c8f4dc5540b67ddd6752bafefa3fd684d6b45f30ff61aec8d769d160368e5f48742b", @ANYRESDEC=r0, @ANYBLOB="03e9104c5edfbd9c8fbd23467dee8d579f6c129c80d4ae80cf470bd6ed4441dd24daf2e3c29475bb243c1ca69495b90846a362bf926dd27d3fc099c866f1b36a6482e8a0a0d632db3e06470eb486eee5c91dc164bfd2ebba17a28a5cff7f000000000000491748"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:39 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000270000", 0x1c) 00:08:39 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd1340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2918.558690][T14873] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2918.582903][T14857] virt_wifi0 speed is unknown, defaulting to 1000 [ 2918.749785][T14860] IPVS: ftp: loaded support on port[0] = 21 [ 2918.797388][T14888] device vlan2 entered promiscuous mode 00:08:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010003904fcffffff0000000000000000", @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028000000000011afd0300ac0014aa00002400460cde2d9b8b1fa51dc54e0977489b78747bac880c5fefca31320000000000000000000000000000000000703bce4a5466"], 0x40}}, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_rose_SIOCADDRT(r6, 0x890b, &(0x7f00000002c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={'rose', 0x0}, 0x8, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:08:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = epoll_create1(0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000180)={0x90000004}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:39 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000280000", 0x1c) [ 2918.897219][T14888] device bond0 entered promiscuous mode [ 2918.929315][T14888] device bond_slave_0 entered promiscuous mode [ 2918.966607][T14888] device bond_slave_1 entered promiscuous mode [ 2919.038571][T14888] device bond0 left promiscuous mode [ 2919.056468][T14888] device bond_slave_0 left promiscuous mode [ 2919.077952][T14888] device bond_slave_1 left promiscuous mode [ 2919.278006][ T5857] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2919.293080][ T5857] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2919.328365][T14895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2919.354644][T14900] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2919.380067][T14860] lo speed is unknown, defaulting to 1000 [ 2919.391752][T14899] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2919.461203][T14860] virt_wifi0 speed is unknown, defaulting to 1000 00:08:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x801) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) 00:08:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xa00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:40 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000290000", 0x1c) 00:08:40 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd2120000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:40 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r4, r3, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000a545fe056b0cd4951adc849b02cb14e16f9e10000108000000", @ANYRES32=r3, @ANYBLOB="00000000000000001c001a8018000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f00000000c0)) r7 = socket(0x10, 0x80002, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_proto_private(r7, 0x89e9, &(0x7f0000000300)="d59e959391") 00:08:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xa01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2919.896868][ T27] audit: type=1804 audit(1597018120.920:2552): pid=14964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir442499806/syzkaller.yHraxj/3370/cgroup.controllers" dev="sda1" ino=15781 res=1 00:08:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002a0000", 0x1c) 00:08:41 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001d80)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001d40)={&(0x7f0000000700)={0x1610, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1d8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x44, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/(\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x736}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_BITS={0x188, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x98\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x79}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '$&[+]-@\\\x8d%\x00'}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ',}^+,+\xc8[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x165}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, ',^[\x82+!)])\"f[/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'cgroup\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcdba}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'GPL\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'cgroup\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1282}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'cgroup\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1218, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xc4, 0x4, "a664c8d53098b3ac12aeb3659f8351ae3af14a3c49fbb592e783406983055cf72aeb29d1928329bbea01c244dd60a03a20e70f2ac51aaa88bf4dd520479b247e9d8241b7df57619a5e883ce86d6a877169a37ba7557510b5e15fa1441c27788928827da34a82df717f7f6f0bc089492cc13b1ca4a679096acb88ae31b681843ea57ad7ff90d75d257513abf27701e747b1c4fbcd2886b9b48192d45794d53728d5877c264416f7dd911e9a58aaa9da342268bec6b182d141a60d1d20ade829d9"}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "da21d236de8f59efa447d031683004758540da0408da19f7db4a5ecce826bb1c00da4856a47849622d36b969f7aaf3c003cd75a8e0abf45a75a4406d867a97026c8c36553cbb46a611ff22b914e59d3de0a116bc30d7010b7c9ece4336c8aa41860434456cc6bd1b54fffbec958a0974e8f56e9bcef6364a4bbb6245935d3116ff7498ca53bec017540432ff6c0f320355aeae0ae01db57459e0b18974b33cf4c1bdba4bb39a33f1df55b2d790647d4ceb96358dea0e4f3ffe42e63a7cc93581304a0a125d9030b38eaf74fce957aa3f68ce788d2d1ea99145740f64126255383ff7a2544e324358536d9cd55d19847bf7b0e8af8e830579c4887d36da365d235a154f9232ae24f2c3a1fc33c3a28ab57be96d5e56c272116540bf388e544ea0fcd17126fc56509a9b6a58f520609dbc29b1d8de6ea7d7f7f28df0ab5b24834045c9757354ad6deb25bc6ddf71081e6cb2677264f22b0de82ca626f5e686163d81fe15d92163a5bd6f73a7ae2bcde88628359452a7bf720ba464f0739b442fb6458a40cdebb28f8ca4c10cc1d5c028b27f20ee1e713d7ebbd7fb69fbd59ca8e6b0685c616f80a0072293d2fcc6beaff186a841fbb437a08fe90a40dba923e8a607d597f8d1c86ef07a1f2af66441e3df09f098df33a42b54322c31b5b3c9af0bd9c657b5759b893003ae188a0b67d865ee215644996a59bbe17cf01979a79b63ec763058bb4f0c4ea686c499da80af678d259dfdc3e930a931691bd332537ae8dbf0fc1950cdc35a581604ba05b7da08547d63467e902c87c271f2d41b65769599bad073361850b22b14f6af710ca65582ebd69293029597c5e267a4eaae35f98d849e50f34b1bb12ffdd78e26eafb9c7d5b021eb43a5a8108ce3f90d4e6e9e860708b38caf0219f415dcde71d8e053384ba332179df0d0431e52e923b6dc3953eb6762adab7e390bafab57de173d98887c6248d39718b1da6f1d708c471ff36f5bbeeadc17252f48fe4f7d666b297d09c767166ee0712b9abdd64bd549657e253a2baec9ef4bc8058642b9dc5e6cd04ba87d038d32a0fe311b5388c3e485b9923a96d0adecc5c39109453817df6f386fa22031a660b8e0b908dc040620f01e0b29738fb8df49dbe58a565042bdc92e2b7537d2a38fa5f08ce687b171d5af01afff7d1b178c2e880f55e464feda0e06d46826a5ef63b92143ba84ad0e6ce2f006bd17e0940b8f55838c1152a467563b0e2fbe3f413665c80f2ee3566e2748bf76def82fe7504d4f6ec61c35ff072a3129a394efadfa2e7132d3208280ba1cf4afcfa2e87cfe6cb32c19fc4a09a5ad976fcb01a6855e79f1036e0ef9b04f7b15b869da045f0df2ffb914d9f02d6adf7276b890e956c347df7587f58921b9669dc5bdd445c187e94b77bb79e3a7e7d48d70341c02c291daf947cc160013a6dcc7d6d17e940b873313276e3b2fe4aed39e24264a422427e5b45435170fca4659dfb5c911ad4e2d4fb092aba83248146ef0bd04a776ba0b948cfea8a5b19cedae86ca80f09f2c5c22a62b6e7f3877ef6c0de3b563b6b1cd27dcafce677c0f78903cce476da26ad028a389bff4125509536bc2608cf42f2706226c25395487ec05d3ea1de1533c1d6c0b597f7a93a1dbc7ce074d035018fa18c9767de35dfc467073dcd6aac84123055122723e17a35b1f75236d38cc28a647d90142843ae4ed05467fb9a010eb47099cf0d0e6f1586ff942eb789bb547f4b6038c9d0dd74e8bf965898f7c2d9858dd3bf542666752120c9ee978efebd3c2682c59caa49daa84212868d7a6c9ae30dad698e313f417514f6534491a423b24491d7234eec766f4a232e9d311266959573ea293b27d6af3b363971cef709dcf58ea6e68f78d8bad92942ad8b3616605d3aa134162820ff9bdfa2f47947dc1dd5a53c18ef7331cfd990e388a9611a37780b8e5e4f67f4b6ea10feefe79040313c0d1bc55b40a4345276e8545f045d368f2fbacb2758c02411a215921e084e2e20de8f1d130ec7950dd77cd74682aec3782282f5ad2d237fa5d54dbf38c9a3c0a44590bb72f4c74964b26224b4dccd7a7fbdb5512a538923b2813663de8f147411f18cbe4274518a11f7021e3988305854414c998c30cee68cd23191e7f1a27b6da101f15d4f7117f16bc6e8c516cea307584464604ae43481b80f36a7e3c282831de44a7ecd4339266f7df0e4d69502e13f2225c350c22467728fb8acc67e9a128ccc6a81ce426c19189117b52a108770ac0a5e84caf75503b02d846db760330ff1b6639418638ecb194cbaddb900504f071c20caedbe1f08bcd3482ccba39993bd4fe0ce4c0b5a54e66c8f09bc73152c4538d64980c1ea235d4633cbcba5167f5e19452640269a0d7d4b249b11ce1058839576109b8cbd55ec12d313b19e8041421e686d6d24ad8372b9c39a5e76a54bdde090fd97455d7f21d86bf3f6cf3edca57f09e672d14a81f12215781251ea34c68983677d920e07f16cd3543a18d2e5eba82bcf6bf535eec9a09b3e6c04d2d180c925d3d784230e43a19a7587a13221976d6ca80f98b589e8b3a938b597321b532af3ba945343ce552607ac3856e0621909f303373982bbbf0a867a854c0c6ed2e1f3d0f7ef633608b020167367370a3649b4a75e723967893da7f1089b6de17980e8a3d58d77841f5ddd5e006b45e1272b6a0c415c0842375a045a9360380d7ee78b07a4fc47908d573a87139868a4d22bc84f213a9b14660bd269e22b02502193306e473fc17ab072c56c772fa3b6959b84ea416a664e3974bc342de9168ccfa06ecf62240fbd8161a054da8fb2b366a23bd0a1cc97d36875386f502c5f6e9771a761a797e3ed9783411ec74071c9c4e39d922f12a0e584c9b25502fe90f467e15658f3ea9a0b3c88d865e12ca817613b3b199a20e9d570675677430220f0d7e997bf32334b36bf4c91394c2aa824a8116d670b1e653bd073608fdc91ab21afb39624d11ec555ec51f2781c00b9ad6fc43e42420fe1cffdf07637e4166e8f4e9baafe8c93f4f276c0e58ab38a1f8ac6c4feb5e70fb4e7021041b4f3034d85044ceebbcf65c47bd2f006cad82e73c5d9e869594a11156022a40d65989b0914ae31af9246763d4b41eb7989c9153af307852748d1d50bdbc66a4f7e6dc77eaad3b56572a96173232181a187d8c77cd4dbaf6fbadbbc78f529106b5dc7f0bcf8ec3debbb928cf0f51a9b41031467acbe88dd98e78741a46039bc1f53ecd899f55f3bf3381fed688cf857dd64f3823fd212cf4ec47da06e0cc4002237db877885f7f238d35ef8a00aaedb5b4c4681dfc66fe0d009917cb53c59d4c4a38a375f6eae2c79eafa1a2656a7a3c79ba7af7797c9da820219070c8ef588905e7cefd13a77959716c6651d24719766fdd8163806fcbb43b997411cdda520f89b22e6a672b5b97e93082bdd090d09bc7a0bd366678ef75026f452218386586a8b17e59c46a6cdb86149ae471d1142bb81cccfa53f5e63d80e0480dec789e9dc812437f7b474ef28fdd6495a2b38a4c950eab2a9a6d63ec2a6cfb2a3ab7d25dc35e811d4fbbc66b713b7224d064d64987ef62f958e23b48c0df62da05700ec04242e16b7cd51b84cdf2749bb55d3fe2997828f8e2e90e42535a3863ba201b48c0b4e0a0e0e73809fb1e88d5def6d6554fdc78e3bde2833c2daa0f6cb0880e64bab79a5ef7738164177a0746a4cbf9af38be4fb0123524bbea8fd9a00aa205af9c99937a3de79203376ecb4124916ceed728b25063375b3ae3237af3b8d8cc70ea900f9060ff0947b75ece277dc29375945c5cb0a4e8322218ab16e66ad7c6e98990bb6f5151a241c2144b9a70dd578d0878cd1930c0ae50ffa702a7e450e87799f973b5ef4db086165a2f97255876f738f0c43c2bd7872a5100d8a305c3b7a58bd533837adf3c4f9910c932d769b84f0b4635cd6aee326c00225cc836fab5bca3019ff4443c0d347d2833479e2427975ce39690abf5278011eb5332482bf237d965e013a62e3f656cf9617a95c23a33c64d2cadeeabee23b7a6d618387ffd9c21cee8386271b14ee556791ebe6a3c2e9601225637855d0fec9b945d5a309dfeedf647df1605e4584dd966527f901fdbeed4cd80ab6aec7e4b1165ac1d6493905c9f903aafe25ae860d2ad8bae969e714552be0bf76efc09d0cf2a21fd0b0eedbe37c243ab97afd0d1ba4d8c40d5144094048824ebef09d26352951489c9665d64d775e0b0aa1a1fbd6608d4fefdc758552b5d0425baf1ec1f9a6bed61875800a9675b2b67776f605ae3bea933e65f8f46391ba9fc6a543eaeee42d17b3ce060f079a00a37c7b9c8709b06dea94b266dc97ffbf3fa2a698e24b5362fb03cb1ffb9a06311d7eaf7b76d7680f5e5d268973684908a711a1a59d25813ac22782ffd92575a7c69b5176f6f29dbb67d1ec9857b84c8312aadca821e58208e8ecd2a8e61876caf3b430a2b02612759aa8a13276706ff3ab8144847b2763d10728ae8e080cf75be77d374e79cd3e744a2f3b9e37cc5735e2d331e8892703f5e03ad0b5938dfa1b58f88d31373e815ceede6ba47abfdf7d488c0539a50ab5a582e5674a0da278eb61c7df241313ea3c9a5e6b83d761727e9181bd50d433869b1bdbb6eb1e854bbcdf32ef2a94aedc1e9aff4fcfc6d06180013a9a9780b71ca19810acfe91001a86cfbaebc2652fa88b3bec2b9f8e9bd82d0cad618b96f8332eb2f91b2b0574d25eb31aab08fe8444c6b783733faf07dec8ee95f1548b8362986c99d77e46c7a081b69ad59b37a9b8aeb05eab72b43c824c56a9c111781bbf212a132cb6c871b891c7d27d237aa519fceb2b6648772081818a452d32c0665937f75acb1ec9d572aa558e779a53123e0d2e2bcceaf2dbd7d645a56072c8e62ec2fb4a08feba2550de5cfee7203df1b8efdb83fcba15a5b35e93adc88bfbf08456fff8be5984de3cd0dea6d289173c6fdc9e84e326385a7a83a2108ec3d6296eab13e398704cd1651d7cb730445dfe0b408585c3ca414a660b33cff28d378651fbef4bed2ab342f49c3a7c37a8b22490e1afe954b63fd9836845c05812f78e80f028d15202ed05fae338ae4f5d61f785831e8f6ea07ebb4414ba63396d02a5421ade2c047dd525ba9440648bf702c76df6d7d292cce2d78140475cdec0891bd7cf627f65bb794f3c25c8d145481a2988aab5dc79094dc831f7346e6b5f6fce071500b64a61e37d519e0039c0a4092876b7941de43f8712dd19bbf73414c0d44c0134b02ba51068829d71961c566566a29693e7e260b606a9628839a60905c0faa1dbae2ce3d28b70a613c44f79b10e661effa02a34caf3d1e752222b4eb17a0e77054d12eb332fb56101d95e0891149eb8da4e81d03da40647f0ae9fb96c61f4ec7b553a56583b65be03c0012accb8e23fda5bef67e993c03c283fb6ddb268ca12c617346258b7c5e52f24e56b25e2ca1a4f93552a645f838b65f6fe2390e792a15ed47a8d26c9782446aa8ece1bdec3dd1a2dfcca4d37a5bccedafc0baf1e69060684d023cdfc5e51fb321e43f032a713bc8e1ff357517d49d32a5ddc404e583ba4d1087f7e2027e412df7669e4b494bf9873f5f968c1453f33f28d4c276cc1e2516c9c2b07279394b491926bbe7883fd5fe023e0e292b4d84732a795722587cca9c09eabd16e977034065c21ae1fbce5cc42f7a303530dfaeb40f610df0b455d79cbbff3093d9e2676cabd7f60f0883ca2d23705c70b05fa07614c27efbfd79903e24d3b"}, @ETHTOOL_A_BITSET_VALUE={0xdc, 0x4, "cfddab2450cf6f780f4ffc0b9af96bcc4bfc1b500ee23798b5734526649fe3fbc8cd1922456996a93d6cbcd23b67f5bee7bb95948ddefee704a2fbc97c0043953a5b219c281727229fbcd78cd5abf33938c5546cd9b3280758af0d42d3df380583af303fff18f05b3a10fc5164a312534416d27022d0e50e900cf95135b5f72287bed3c6d177ca1272863bc334e1484c4c780e26cf72ec9cf1cb1e235686a4beea9013956399b4e3397e028968dbf092521c879648e57cc59b9c2f1eb87daa8c7bc2bffbd03da923caec740366cbde9f66cbefb634bd9b17"}, @ETHTOOL_A_BITSET_VALUE={0x12, 0x4, "34ace4003955c2da7b5d0a4706e7"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x50, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '!\xb8$(%-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&*&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'cgroup\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4b}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}]}, 0x1610}, 0x1, 0x0, 0x0, 0x4}, 0x40018d0) socket$kcm(0x2, 0x5, 0x0) 00:08:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xa02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2920.070948][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.100233][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.111816][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2920.145922][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.170285][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:08:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xa03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2920.211864][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.254197][ T27] audit: type=1804 audit(1597018121.280:2553): pid=14986 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3882/cgroup.controllers" dev="sda1" ino=16379 res=1 00:08:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xb00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2920.295280][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.307941][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.337966][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2920.359174][T14978] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:08:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendto$unix(r1, &(0x7f00000000c0)="7742328648064e746f42ac76fb4f18a7ec964941f8e2c9adbc839b32933f426bf8f7446bae318f71f85bcc6d68eb32fd7c8b4142a01c466866688cf7705ae8a1b73fe77d59b0b9cdb6939712bf85ef505ad65d1868a223e82ddba2979adb9cece53cb6c92dfde2e250f3b5e2de270dfdfd95acffe4a3724155dd87", 0x7b, 0x0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000031c0)={0x0, 0x0, &(0x7f0000003180)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000000900000000000000000000000900020025aeb7210000000008004100736977001400fb4470cb6c6e089ade8fca927044f333"], 0x1}}, 0x0) sendfile(r6, r5, 0x0, 0x80000000) 00:08:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xb01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002b0000", 0x1c) [ 2921.050598][ T27] audit: type=1804 audit(1597018122.070:2554): pid=15019 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3883/cgroup.controllers" dev="sda1" ino=15859 res=1 00:08:42 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd2340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xb02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c00e8000000000000000000000000000000000088ae244fd9161419d8c21e5a6f9d8f892831345a1195e3d396900fcea0a0fee885371adbc0777391a2d98d125cd52da145e8a1e6d8efa91f55d8fdd1230797752782869221f90cf4c747c36b21a874e6107b7432f8695aeec002b355f7c5acec4d699a163fe8632cfc0d", @ANYRES32=r3, @ANYBLOB="00000000000000001c001a8018000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) 00:08:42 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000002000000950000000000000008b8b11c6600424465193bb038a51fa21406000000f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:42 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002c0000", 0x1c) 00:08:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xb03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:42 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x2, 0x3, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x800}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x3}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0xb8b}, @NFQA_CFG_QUEUE_MAXLEN={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x80) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r5, r4, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xc00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2921.679955][ T27] audit: type=1804 audit(1597018122.700:2555): pid=15016 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3883/cgroup.controllers" dev="sda1" ino=15859 res=1 00:08:42 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000002000000950000000000000008b8b11c6600424465193bb038a51fa21406000000f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xc01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xc02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@null=' \x00', 0x0, 'veth1_to_bridge\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40010) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 2922.055484][T15036] device vlan2 entered promiscuous mode [ 2922.083184][T15036] device bond0 entered promiscuous mode [ 2922.088771][T15036] device bond_slave_0 entered promiscuous mode [ 2922.096462][T15036] device bond_slave_1 entered promiscuous mode [ 2922.124339][T15036] device bond0 left promiscuous mode [ 2922.129655][T15036] device bond_slave_0 left promiscuous mode [ 2922.166553][T15036] device bond_slave_1 left promiscuous mode [ 2922.352856][T15045] __nla_validate_parse: 8 callbacks suppressed [ 2922.352864][T15045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2922.429611][T15063] device vlan2 entered promiscuous mode [ 2922.448878][T15063] device bond0 entered promiscuous mode [ 2922.458918][T15063] device bond_slave_0 entered promiscuous mode [ 2922.469784][T15063] device bond_slave_1 entered promiscuous mode [ 2922.487481][T15063] device bond0 left promiscuous mode [ 2922.497930][T15063] device bond_slave_0 left promiscuous mode [ 2922.507059][T15063] device bond_slave_1 left promiscuous mode [ 2922.631166][T15049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:43 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd3340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xc03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002d0000", 0x1c) 00:08:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@null=' \x00', 0x0, 'veth1_to_bridge\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x8000000000004) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40010) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 00:08:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r6, 0x600, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x8090) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:08:43 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000300)={0x3, &(0x7f0000000140)=[{@fixed}, {@fixed}, {@fixed}]}) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) 00:08:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xd00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2922.786376][T15084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002e0000", 0x1c) 00:08:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b0400000031032c05e6"], 0xd) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfef0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f0eb238967bba32168c730d4b4bb46a04fda5f5bc"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r3 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r2, 0x536ae464467e3929, 0x0, 0x0, {0x25, 0x0, 0x6800}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x8, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x2, r3, 0x1, 0x6, 0xfffffffc, 0x6, 0x0, 0xbd}, ["", ""]}, 0x38}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r5, r4, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xd01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:44 executing program 2: socket$inet6_icmp(0xa, 0x2, 0x3a) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xffffffff, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffb77e, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1b}}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000002740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x4e8, 0x0, 0x0, 0x5e0, 0x5e0, 0x720, 0x720, 0x720, 0x720, 0x720, 0x6, &(0x7f0000000180), {[{{@uncond, 0x0, 0xa4, 0xc8}, @HL={0x24, 'HL\x00'}}, {{@ipv6={@private1, @empty, [], [], 'sit0\x00', 'rose0\x00'}, 0x0, 0xa4, 0xe8}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv6=@empty, @ipv6=@empty}}}, {{@uncond, 0x0, 0xa4, 0xe8}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@dev, @ipv4=@multicast1}}}, {{@ipv6={@mcast1, @ipv4={[], [], @broadcast}, [0x0, 0x0, 0x0, 0xffffff00], [], 'ip6_vti0\x00', 'vlan0\x00'}, 0x0, 0xa4, 0xc8}, @HL={0x24, 'HL\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0={0xfc, 0x0, [], 0x1}, [0xff, 0xffffff00, 0xff, 0xff], [0xff, 0x0, 0xff000000], 'netdevsim0\x00', 'macvlan0\x00', {}, {0xff}, 0x88, 0x7f, 0x0, 0x23}, 0x0, 0xec, 0x130, 0x0, {}, [@common=@ipv6header={{0x24, 'ipv6header\x00'}}, @common=@ipv6header={{0x24, 'ipv6header\x00'}, {0x8, 0x10}}]}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv6=@dev={0xfe, 0x80, [], 0x40}, 0x30, 0x37, 0x80}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x5b4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0) r1 = socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000005, 0x80010, r1, 0x2f283000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000001740)="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", 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xb, &(0x7f0000000480)={&(0x7f0000ab8000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 00:08:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xd02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2923.298831][T15091] device vlan2 entered promiscuous mode [ 2923.307077][T15091] device bond0 entered promiscuous mode [ 2923.314587][T15091] device bond_slave_0 entered promiscuous mode [ 2923.320885][T15091] device bond_slave_1 entered promiscuous mode [ 2923.332832][T15091] device bond0 left promiscuous mode [ 2923.338149][T15091] device bond_slave_0 left promiscuous mode [ 2923.345558][T15091] device bond_slave_1 left promiscuous mode [ 2923.489207][T15103] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2923.512420][T15084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:44 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd4340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:44 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="0290d286d2a3"}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5928fee525deffe85b0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000001) 00:08:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xd03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000002f0000", 0x1c) [ 2923.561689][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 2923.653755][T15103] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2923.708115][ T27] audit: type=1804 audit(1597018124.730:2556): pid=15124 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3888/cgroup.controllers" dev="sda1" ino=16338 res=1 [ 2923.721955][T15131] device vlan2 entered promiscuous mode [ 2923.745503][T15131] device bond0 entered promiscuous mode [ 2923.751198][T15131] device bond_slave_0 entered promiscuous mode [ 2923.758176][T15131] device bond_slave_1 entered promiscuous mode [ 2923.773984][T15131] device bond0 left promiscuous mode [ 2923.779446][T15131] device bond_slave_0 left promiscuous mode [ 2923.787143][T15131] device bond_slave_1 left promiscuous mode [ 2923.904920][T15124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2923.948182][T15103] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2924.049564][T15103] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2924.149638][T15103] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2924.165756][T15103] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2924.183401][T15103] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 00:08:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000300000", 0x1c) 00:08:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:45 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd5340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000000)={r10}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={r10, 0xb8, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0xf6e3, @private2={0xfc, 0x2, [], 0x1}, 0x8000}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e21, @rand_addr=0x64010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, @in6={0xa, 0x4e21, 0x4, @private0={0xfc, 0x0, [], 0x1}, 0x1}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000340)=0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2924.199551][T15103] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2924.285655][T16607] tipc: TX() has been purged, node left! [ 2924.293854][T16607] tipc: TX() has been purged, node left! [ 2924.314918][T15135] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2924.384537][T15162] device vlan2 entered promiscuous mode [ 2924.416751][T15162] device bond0 entered promiscuous mode [ 2924.424834][T15162] device bond_slave_0 entered promiscuous mode [ 2924.440120][T15162] device bond_slave_1 entered promiscuous mode [ 2924.459991][T15162] device bond0 left promiscuous mode [ 2924.468266][T15162] device bond_slave_0 left promiscuous mode [ 2924.509533][T15162] device bond_slave_1 left promiscuous mode [ 2924.879504][T15135] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2924.942984][T15162] device vlan2 entered promiscuous mode [ 2924.950701][T15162] device bond0 entered promiscuous mode [ 2924.957726][T15162] device bond_slave_0 entered promiscuous mode [ 2924.965906][T15162] device bond_slave_1 entered promiscuous mode [ 2924.976590][T15162] device bond0 left promiscuous mode [ 2924.985424][T15162] device bond_slave_0 left promiscuous mode [ 2924.998547][T15162] device bond_slave_1 left promiscuous mode [ 2925.194617][T15135] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2925.279342][T15135] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2925.347438][T15135] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2925.364227][T15135] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2925.381557][T15135] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 00:08:46 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000600000", 0x1c) 00:08:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c64dd15e1b71c49256565a5554a91f93d80a6e5e31fc15c9f592f76dac3efb2bfa9f13d26e653100bba04b58385a611f7229ada43042480ac8ebd84cd8fac153fb3eeeaa2c7eb1c5c1a5370e58d1a8fc7ecb07a201c9f48c8b1f8124cee28bf7edbdd735761ce898bf5b9d1ff0100000e4878eebbe3bb6b36a7eb5509edf23fd6ffc44c2eac8571c7598f645205f41d6f06f42714429da58f21b7f938b8a7644db63d9130f9d3ff57954d16f5918934bba7a313ae01533a70e1e5c927cbc8c8a2945353e0e1ffac10a6a2d5f47cdf9195604a6c721504b35975cdff951849ae985059deb46bfa"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00q\x00E7\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="0c000180080001f600000100"], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'sit0\x00', r4, 0x4, 0x7, 0x5, 0xfffffffa, 0x34, @loopback, @dev={0xfe, 0x80, [], 0x3b}, 0x7, 0x4740, 0x8, 0x9}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@deltfilter={0x2c, 0x2d, 0x400, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x3, 0x9}, {0x3, 0xb}, {0x4, 0xd}}, [@TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc4}, 0x20000080) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2925.436392][T15135] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 00:08:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd6030000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:46 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="0290d286d2a3"}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5928fee525deffe85b0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000001) 00:08:46 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r3, r2}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2925.609475][T15205] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000f00000", 0x1c) 00:08:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xe03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2925.775520][ T27] audit: type=1804 audit(1597018126.800:2557): pid=15213 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3889/cgroup.controllers" dev="sda1" ino=16370 res=1 00:08:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xf00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xf01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xf02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2925.993629][T15215] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2926.023000][T15223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2926.066131][T15213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:08:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000300", 0x1c) 00:08:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0xf03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2926.143545][T15212] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000010000108000000000000000000000000250b4ccc7e8cf92cb153b822cae23474d5e9662d0b13ba82dc2f8709ab25882b982bcd793260ae7d1d7665cb2e42a29232a375b098932619c4b50585820d6e46d14ced4a9b90b8f491e55502ae723dd875314bbffbfdc7b79c124bcd618108bbc73db16cc680c594534317b58cf05e177dfeaeebf4ec30a14f4fa561296dc4b29d2063edf401f07c84ea482c8b1f2d0bb6285a638218528e25a451ad1ed891056df09c25a064b88deb34b4341f82e556fba765ed31ec03b807fbc877b4cfac5a67f02f64519a04be907eff89578b5fd6", @ANYRES32=r3, @ANYBLOB="00000000000000001c001a8018000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) 00:08:47 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd6340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:47 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="0290d286d2a3"}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5928fee525deffe85b0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000001) 00:08:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x7, &(0x7f0000000000)='\njroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00j\x00\x00\x00\x00\x00\b\x00i'], 0x5}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x200}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r4}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0x2c}}, 0x40814) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, r5, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="19000040010000000000000097c2bdf193e09f4d4627450000132f14600000009500424465193bb038a51fa214d76d67e4f1fc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r8, r9, 0x1e}, 0x10) socket$kcm(0x2, 0x5, 0x0) 00:08:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000500", 0x1c) 00:08:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:47 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0x2, 0x5, 0x0) socket(0x26, 0x1, 0xfffffff8) 00:08:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:47 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a900790b7e7e1a189066665601000000000000000000000061021200000056f288f3cc199ae200000008b8b11c6600424465193bb038a51f"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x22, &(0x7f0000000180)={0x0, 0x3d2}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={0xffffffffffffffff}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2, r3}) socket$kcm(0x2, 0x5, 0x0) [ 2926.881003][ T27] audit: type=1804 audit(1597018127.900:2558): pid=15265 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3890/cgroup.controllers" dev="sda1" ino=16369 res=1 [ 2926.926802][T15250] device vlan2 entered promiscuous mode 00:08:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000000000000000006112000000000000950000000000000008b8b11c6600424465193bb038a51fa214d76d67e4f1fce1892c9d92"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) r2 = socket$kcm(0x2, 0x5, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000002680)={r3}) setsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, &(0x7f00000026c0)=0x1, 0x4) 00:08:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2926.969737][T15250] device bond0 entered promiscuous mode [ 2926.995474][T15250] device bond_slave_0 entered promiscuous mode [ 2927.028257][T15250] device bond_slave_1 entered promiscuous mode [ 2927.060145][T15250] device bond0 left promiscuous mode [ 2927.079106][T15250] device bond_slave_0 left promiscuous mode [ 2927.096940][T15250] device bond_slave_1 left promiscuous mode 00:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="40000000ff0f00"/20, @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r6, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r4}]}, 0x28}}, 0x4008000) [ 2927.478623][T15287] device vlan2 entered promiscuous mode [ 2927.494672][T15287] device bond0 entered promiscuous mode [ 2927.500262][T15287] device bond_slave_0 entered promiscuous mode [ 2927.522947][T15287] device bond_slave_1 entered promiscuous mode [ 2927.539382][T15287] device bond0 left promiscuous mode [ 2927.545243][T15287] device bond_slave_0 left promiscuous mode [ 2927.553327][T15287] device bond_slave_1 left promiscuous mode 00:08:48 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd7340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:48 executing program 1: socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="0290d286d2a3"}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5928fee525deffe85b0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000001) 00:08:48 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000600", 0x1c) 00:08:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:48 executing program 2: socket(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r7], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="0290d286d2a3"}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5928fee525deffe85b0500010007"], 0x1}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r1, 0x0, 0x100000001) 00:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4026b41307070d7d3900"/20, @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r6, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:08:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f00000016c0)=@dellinkprop={0xfc, 0x6d, 0x100, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, 0x3c8, 0x52240}, [@IFLA_LINK_NETNSID={0x8, 0x25, 0x1}, @IFLA_EVENT={0x8, 0x2c, 0x2}, @IFLA_BROADCAST={0xa, 0x2, @local}, @IFLA_AF_SPEC={0x98, 0x1a, 0x0, 0x1, [@AF_BRIDGE={0x4}, @AF_INET6={0x60, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x8}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, [], 0x14}}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x4}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xa0}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}, @AF_BRIDGE={0x4}, @AF_MPLS={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0xd, 0x0, 0x0, 0x6}, {0x8, 0xa, 0x0, 0x0, 0x5}, {0x8, 0x9, 0x0, 0x0, 0xaf5c}, {0x8, 0x12, 0x0, 0x0, 0xe2d}]}}]}, @IFLA_PHYS_PORT_ID={0xe, 0x22, "362a288f4b494bdca808"}, @IFLA_TXQLEN={0x8, 0xd, 0x9}, @IFLA_MTU={0x8, 0x4, 0x9}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xbb07}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000c0}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000006c0)=""/4096, 0x1000, 0x100, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x3, 0x1, {0xa, 0x4e22, 0x0, @private1, 0x40}}}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r9}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@ipv6_getaddrlabel={0x34, 0x4a, 0x1, 0x70bd29, 0x25dfdbfc, {0xa, 0x0, 0x10, 0x0, 0x0, 0x80}, [@IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8, 0x2, 0xb}]}, 0x34}}, 0x0) 00:08:48 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000700", 0x1c) 00:08:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2927.962554][ T27] audit: type=1804 audit(1597018128.990:2559): pid=15318 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3891/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 2928.011846][T15319] device vlan2 entered promiscuous mode [ 2928.077345][T15319] device bond0 entered promiscuous mode [ 2928.106046][T15319] device bond_slave_0 entered promiscuous mode 00:08:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2928.127100][ T27] audit: type=1804 audit(1597018129.140:2560): pid=15308 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir442499806/syzkaller.yHraxj/3382/cgroup.controllers" dev="sda1" ino=16380 res=1 [ 2928.147977][T15319] device bond_slave_1 entered promiscuous mode [ 2928.180719][T15319] device bond0 left promiscuous mode [ 2928.190728][T15319] device bond_slave_0 left promiscuous mode [ 2928.202571][T15319] device bond_slave_1 left promiscuous mode 00:08:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2928.671546][T15327] __nla_validate_parse: 5 callbacks suppressed [ 2928.671555][T15327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2928.725354][T15309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2928.756280][T15308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:50 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd8340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000900", 0x1c) 00:08:50 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd6340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe000000008500000005000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffffffff55bb2007ee51050512b5b42128aa090a79507df79f298129da487130d5f24bf901115e17392ac66ad029d1c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1efc5f9094fa737c28b994a8512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d6f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db3503680e5e5971ff4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b57479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af0a77fbcf2cd1d0000002000000001c800000000000000000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef40662d7836d252c566f5ee938a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec7eee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada209bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5d81e750d50515a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d3fcd116bce9c764c714c9402c21d181aae59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4000000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b850580994484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af00f191b66b6a6f732a91f0e2e9120be61e58c79d497247d278888901d44bf77ff246605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002100000000000000000000000027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b50f3ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a2102fa1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d3958f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4c"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) [ 2929.058023][T15330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x80002, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x4}, 0x10) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x24, 0x10, 0x801, 0xfffffffa, 0x0, {0x0, 0x0, 0x0, r3, 0x0, 0x400}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 00:08:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000a00", 0x1c) [ 2929.213047][T15362] device vlan2 entered promiscuous mode 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2929.263279][T15362] bond0: (slave vlan2): Opening slave failed [ 2929.337936][T15365] device vlan2 entered promiscuous mode [ 2929.396649][T15365] device bond0 entered promiscuous mode [ 2929.425269][T15365] device bond_slave_0 entered promiscuous mode 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2929.446842][T15365] device bond_slave_1 entered promiscuous mode [ 2929.458963][T15365] device bond0 left promiscuous mode [ 2929.470845][T15365] device bond_slave_0 left promiscuous mode 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2929.501760][T15365] device bond_slave_1 left promiscuous mode 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2929.895972][T15370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2930.398240][T15396] device vlan2 entered promiscuous mode [ 2930.425973][T15396] device bond0 entered promiscuous mode [ 2930.446562][T15396] device bond_slave_0 entered promiscuous mode [ 2930.462432][T15396] device bond_slave_1 entered promiscuous mode [ 2930.480244][T15396] device bond0 left promiscuous mode [ 2930.485864][T15396] device bond_slave_0 left promiscuous mode [ 2930.500574][T15396] device bond_slave_1 left promiscuous mode [ 2930.689670][T15370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd9340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000b00", 0x1c) 00:08:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1400}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:51 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000001) r5 = gettid() write$cgroup_pid(r3, &(0x7f0000000400)=r5, 0x12) r6 = socket(0x10, 0x803, 0x20) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x805) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x3f9, 0x4, 0x70bd2b, 0x25dfdbfc, {0x1, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x820) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0xa800}, 0x0) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000003c0)='tls\x00', 0x4) 00:08:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, 0x7, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xfffffc00}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x20}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="007387076e49a3c39e6db5b006738c89b35275fd1f2daa3ced68e4a7ac1dcc858488da9353706a5a805372664061490076d8c6edb3e84d529d9700c965cfe11f6aaf2e284bcce5e8ec6521faf78d1cdb93ba5d875e6459cc", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000400)={r7, 0x8}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={r8, 0x4}, 0x8) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@loopback, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20}, {@in=@remote, 0x0, 0x32}, @in=@multicast1, {}, {0x0, 0x115}, {0x4}, 0x0, 0x3501, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r11}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x300, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2930.893276][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1401}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2930.986353][T15415] siw: device registration error -23 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000c00", 0x1c) [ 2931.369261][T15418] device vlan2 entered promiscuous mode 00:08:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2931.411347][T15418] device bond0 entered promiscuous mode [ 2931.426273][T15418] device bond_slave_0 entered promiscuous mode [ 2931.442785][T15418] device bond_slave_1 entered promiscuous mode [ 2931.463356][T15418] device bond0 left promiscuous mode [ 2931.469493][T15418] device bond_slave_0 left promiscuous mode [ 2931.485094][T15418] device bond_slave_1 left promiscuous mode [ 2931.734307][T15415] siw: device registration error -23 [ 2931.962591][T15448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:53 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xda340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@ipv4_newroute={0x30, 0x18, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x14, 0x4, 0x1f, 0xfe, 0x1, 0xff, 0x3, 0x400}, [@RTA_METRICS={0x14, 0x8, 0x0, 0x1, "ea32518deec3c31f6de961290d44cab8"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 00:08:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000d00", 0x1c) 00:08:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r1, &(0x7f0000000580)='\x00', 0x1, 0x75a535e198d7edf7, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x7ffffffc, 0x539c, 0xfffffffb}, 0x14) shutdown(r1, 0x1) 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2932.270952][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000e00", 0x1c) [ 2932.767208][T15460] device vlan2 entered promiscuous mode [ 2932.798720][T15460] device bond0 entered promiscuous mode [ 2932.812680][T15460] device bond_slave_0 entered promiscuous mode [ 2932.828897][T15460] device bond_slave_1 entered promiscuous mode 00:08:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2932.859006][T15460] device bond0 left promiscuous mode [ 2932.873779][T15460] device bond_slave_0 left promiscuous mode [ 2932.888578][T15460] device bond_slave_1 left promiscuous mode 00:08:54 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdb340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000c00e00", 0x1c) [ 2933.353400][T15500] device vlan2 entered promiscuous mode 00:08:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2933.402638][T15500] device bond0 entered promiscuous mode [ 2933.428636][T15500] device bond_slave_0 entered promiscuous mode [ 2933.460494][T15500] device bond_slave_1 entered promiscuous mode [ 2933.511157][T15500] device bond0 left promiscuous mode [ 2933.532682][T15500] device bond_slave_0 left promiscuous mode [ 2933.543621][T15500] device bond_slave_1 left promiscuous mode 00:08:54 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @mcast2}, 0x2}, 0x5c) r0 = socket$inet6(0x10, 0x3, 0x6) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x34, r2, 0x1, 0x0, 0x0, {0x3}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x24000040) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=@hopopts={0x0, 0xa, [], [@pad1, @ra, @pad1, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @enc_lim, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x80000001]}}]}, 0x60) sendto$inet6(r0, &(0x7f0000000000)="1ba0000013001d0d89fdc5cbdd045798707bed4dca14a7960f0f8ec8da78031c7660b08f515e", 0xff3b, 0x0, 0x0, 0x147) 00:08:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000f00", 0x1c) 00:08:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1800}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:54 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdc340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2933.919819][T15518] netlink: 40543 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001100", 0x1c) 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2933.999596][T15521] device vlan2 entered promiscuous mode [ 2934.034946][T15521] device bond0 entered promiscuous mode [ 2934.048589][T15521] device bond_slave_0 entered promiscuous mode [ 2934.063573][T15521] device bond_slave_1 entered promiscuous mode [ 2934.087282][T15521] device bond0 left promiscuous mode 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2934.099512][T15521] device bond_slave_0 left promiscuous mode [ 2934.112847][T15521] device bond_slave_1 left promiscuous mode 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:55 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x40eae, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000911d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket(0x1000000010, 0xa, 0xfffffffe) sendmmsg$alg(r1, 0x0, 0x0, 0x0) r2 = gettid() sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCPNGETOBJECT(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)=0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="307136171a642fcbd44e8cf8c0170d4db91dfab9c6547ecddb5c2f109b09773e407341d27aa1c7c664a0a24c63288d3fdd1d23438466e7a48dd97413921d784f5a02defd3275e9f2aea73a2649f2741b3ca0d50f", @ANYRES16, @ANYRESHEX, @ANYBLOB="040216733ce2f796b4b25753da3f3d1992644d03c16532254065af87", @ANYRESDEC, @ANYRESDEC, @ANYRES16=r2, @ANYRES16=r0], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xc, 0x2011, r3, 0x0) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r3, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0xf4, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x81}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x263ec38e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYRES16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x78) close(r0) 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001200", 0x1c) 00:08:55 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdd340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001300", 0x1c) [ 2934.623918][T15545] netlink: 'syz-executor.1': attribute type 9 has an invalid length. [ 2934.768816][T15550] device vlan2 entered promiscuous mode [ 2934.843987][T15550] device bond0 entered promiscuous mode [ 2934.861098][T15550] device bond_slave_0 entered promiscuous mode 00:08:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2934.885840][T15550] device bond_slave_1 entered promiscuous mode [ 2934.948264][T15550] device bond0 left promiscuous mode 00:08:56 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000000000000059b637a38d6d101000000000000000000000000000000000000000000000000c3000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000feb8f611d788b2cf8bfff7d387839c592869e39d7ef939cebfa24754032acdc1fe88eae5ea427fd1a71e48840d88fd47f4b34622e3bd2d2224ea9c09a3f90c823c0f62c8debddba1cfd6adacdc3ad82df3deb410e2f5d5cca4739d5d756a1b6dd737ddb20ef451b538af6d3abec4aa2c3f6d66f53997d0e14c347e9401bfd097bc5d4a244032695b564a0c95bbfeef3fd42dde19b7c6a601fe89c2e93fd635f426a67c2cfba99b116b2a3bb69c92b78104df8d925a077c7788f870793351e7f547c87c"]) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="01100000000000009ee4ac9785a9ccf7558b9d792f4a87380000000000000000000000000000000024000000", @ANYRES32=r6, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000e4ccd0b3aa1055aa83ede891b703056e5d2e24a4221a0c4987b3052b897c12a051fd9006"]) sendfile(r2, r1, 0x0, 0xffffffff806) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r9 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r8, 0x536ae464467e3929, 0x0, 0x0, {0x25, 0x0, 0x6800}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x8, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x2, r9, 0x1, 0x6, 0xfffffffc, 0x6, 0x0, 0xbd}, ["", ""]}, 0x38}}, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='memory.events\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r9, r10, 0x0, 0x1, &(0x7f0000000340)='\x00'}, 0x30) [ 2934.970000][T15550] device bond_slave_0 left promiscuous mode [ 2934.990797][T21374] Bluetooth: hci5: command 0x0406 tx timeout [ 2935.009627][T15550] device bond_slave_1 left promiscuous mode [ 2935.058022][ T27] audit: type=1804 audit(1597018136.081:2561): pid=15573 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3893/memory.events" dev="sda1" ino=16362 res=1 00:08:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1a00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2935.109849][ T27] audit: type=1800 audit(1597018136.111:2562): pid=15573 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16362 res=0 00:08:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1a01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1a02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1a03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2935.595700][T15573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2935.704292][T15574] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2935.728256][T15574] netdevsim netdevsim2 eth3 (unregistering): unset [1, 1] type 2 family 0 port 11 - 0 [ 2935.774304][T15586] device vlan2 entered promiscuous mode [ 2935.802520][T15586] team0: Device vlan2 is already an upper device of the team interface [ 2935.842202][ T27] audit: type=1800 audit(1597018136.871:2563): pid=15577 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16362 res=0 [ 2935.993316][T15574] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2936.014873][T15574] netdevsim netdevsim2 eth2 (unregistering): unset [1, 1] type 2 family 0 port 11 - 0 [ 2936.042800][T15573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2936.151843][T15574] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2936.174311][T15574] netdevsim netdevsim2 eth1 (unregistering): unset [1, 1] type 2 family 0 port 11 - 0 [ 2936.268220][T15574] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2936.288340][T15574] netdevsim netdevsim2 eth0 (unregistering): unset [1, 1] type 2 family 0 port 11 - 0 [ 2936.376397][T15574] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 11 - 0 [ 2936.391969][T15574] netdevsim netdevsim2 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 2936.424287][T15574] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 11 - 0 [ 2936.432990][T15574] netdevsim netdevsim2 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 2936.457277][T15574] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 11 - 0 [ 2936.465814][T15574] netdevsim netdevsim2 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 2936.487082][T15574] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 11 - 0 [ 2936.498431][T15574] netdevsim netdevsim2 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 2936.509557][T15581] netlink: 'syz-executor.1': attribute type 9 has an invalid length. 00:08:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1b00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:57 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001400", 0x1c) 00:08:57 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xde340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x605c037faeb08d3d}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_getrule={0x1c, 0x22, 0x1, 0x70bd2d, 0x25dfdbfe, {0xa, 0x14, 0x10, 0x6, 0x6, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000800)=ANY=[@ANYBLOB="000000000000000ca23d162be71daf89340b09439bc433a4000000000000000000000000000000003e0000009c4c64dbbab517d0afcb4e44ac89bcc90c48c50f33e0c9cc5de39d575f4b30e4a111101d076bfaebdfc6210d4f8e6936d4c1670de29bdc28b79be7c2d8c1b50be44d1df55cba780299e2b4b2313b66b827da06a457beb633007035a6e19ce198", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000ce7c64b06a6db69ead1d3f9c78df24026602d256939c0ecac005a053c21cb841bb5ed2e03e83decd1a7c3cf92b14e2413ceb4968cd34800d5b20da58d035"]) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000540)={{0x2, 0x0, @identifier="5e20dcc848e9492c1efacda7ca1b1882"}, 0xc2, r6, [], "64776087104fe967c46507fd304c3aa634525e00e557fd82c53680c203a6f48678e2b69519a8edaa481c7a1dada58c4454f04bec0d31eb5a7aaedbc4c0191cc6c1afcf9c6cbabeac29b2511d2312a3ce50c523f621331f766df4316e5c9a26d49cf14fc6380d5b44600054274c4c07b55e2fe934d11c4ff00ec47de9aa18d34c2854e44a6f7c9f5e3f635c1ee65129322dfc60d493c203a42f650ab76f967d2d3b52618333239af8a3d2cab1d224ebf1d883c4ab9b59aa0f6c698af83c0b46cf0f8a"}) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001000390400"/20, @ANYRES32=r4, @ANYBLOB="0000000000ebff040000000000000000"], 0x28}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r8, r7, 0x0, 0x100000001) r9 = socket$netlink(0x10, 0x3, 0xf) sendmsg$nl_crypto(r9, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)=ANY=[@ANYBLOB="f0000000120000042bbd7000fcdbdf256563622863617374362900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c2da81775aceabe600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000024000000200000000000000000000008000100000000800800010006000000"], 0xf0}, 0x1, 0x0, 0x0, 0x4004001}, 0x1) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f00000000c0)={0x1, 0x1, [@remote]}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=ANY=[@ANYBLOB="010001000500"/20, @ANYRES32=r3, @ANYBLOB="00090000000000001c001a8018000a8014000700fe880000000000000000000000000001080c2a4f4a92bf9f15b27005ab7e6c437d9a559cdc8f08e0f52cd95cb48709a7dcde38f6d675144e0408f7f3c92df1453888f197f78446e8855c31e757a4b4d75d49eb5a80554e2bbb85df91d4b189bf6849794f93fb1d32f80b0016f83168ba2045b8233cf2fb43fd47697b82ab4418674fe451dc0235e4649bd1143a88508b97c60a248e8ba0b4ce5d7325fac99b5f9d31ed3ddef2d69ad11441f1adda1c36a2621d37f5fd8e28722762dcb1b894ec5b2dd648863fca19b6ee5ffae7f181f9ac14cea7e26b747bfc25d9e1a840ba191bbe2d2a6187933625e3fa1e2a2711d9c2c444dac8661429918420bc634c33de142071c5c3070000"], 0x3c}}, 0x0) 00:08:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000240)="46048320ee3053b220677d11ba3c564ceb07bb4c15c33f95e1431a2863ab359d7357200eb8d76de7a610e792f42d986742f715a5a52dc2b4b7b540ba7395f4c05876566cc09434d76f32d4351179307abb27198fbe6578d8151622124f32bc311b8297010bf9fe772cd88f6d7e511aa8e7ffbbc047cd4149c3aaf9736548c0e87365d8fcd3ac3ea5a6380b98601eeda2c07a5910f7fb5c986bd195e37fdca36b0395398c5483fced60e8ab", 0xab, 0xf851c9359997aa5e, &(0x7f000005ffe4)={0xa, 0x4e63, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x1f}, 0x1c) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0x1, 0x69}) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r5, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0xf0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x7186, 0x4, 0x3f, 0x3}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x4008851) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) socket$nl_generic(0x10, 0x3, 0x10) [ 2936.781039][T15653] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2936.807137][T15656] net_ratelimit: 89 callbacks suppressed [ 2936.807145][T15656] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:08:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1b01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2936.828445][T15655] device vlan2 entered promiscuous mode 00:08:57 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001500", 0x1c) [ 2936.853905][T15655] device bond0 entered promiscuous mode [ 2936.879234][T15655] device bond_slave_0 entered promiscuous mode [ 2936.887493][T15655] device bond_slave_1 entered promiscuous mode 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1b02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2936.929602][T15655] device bond0 left promiscuous mode [ 2936.947443][T15655] device bond_slave_0 left promiscuous mode [ 2936.966025][T15655] device bond_slave_1 left promiscuous mode 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1b03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1c00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2937.287182][T15660] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:08:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001600", 0x1c) 00:08:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc1702, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r4, &(0x7f0000000300)={@val={0x2}, @void, @eth={@broadcast, @random="090986251a20", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @loopback}, {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x4}}}}}}}}, 0x6a) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r8}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1c01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:58 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdf340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:08:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001700", 0x1c) [ 2937.574279][T15668] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1c02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xd4, 0x453, 0x200, 0x70bd26, 0x25dfdbfc, "3349a41585dc644504add81e66250a861eea34c2764503a0285f87ec519ceb45901147cc9bc74c9acfe0dd217675630a7cbfee241c13dcd89d2b8bfd372f684f51c51a026f60f83adc26c189603887caea1d2b1161118128f953c24d95d24c4eac10411becba7dff64cad8c9095870ada71a2c1ad3ec1fae1fb9b2dec9ff67d8861792024593c1dbacc3bf4953aa9bfb7e0cc7efcd1e874ed54324b989cdc91e88a930e21421bc914d6ed5f424b155707b00e85affb69150c201c79f8da45254aa", [""]}, 0xd4}, 0x1, 0x0, 0x0, 0x4011}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) r2 = accept(0xffffffffffffffff, &(0x7f0000002b80)=@caif=@util, &(0x7f0000002c00)=0x80) getsockname$netrom(r2, &(0x7f0000002c40)={{0x3, @netrom}, [@null, @null, @rose, @null, @null, @bcast, @null]}, &(0x7f0000002cc0)=0x48) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004060102e60001007a58008015ffff000500010007"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000000) 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1c03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1d00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2937.931716][ T27] audit: type=1804 audit(1597018138.961:2564): pid=15704 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3895/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 2937.942470][T15701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 00:08:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1d01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffd, 0x0, 0xb3550aa4ba878254}, 0x9c) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000080), 0x8) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="ee08aa49", @ANYRES16=r2, @ANYBLOB="040026bd7000fcdbdf250800000008000400ac1414aa2400070073797374656d5f753a6f626a6563745f723a7373685f657865635f743a733000"], 0x40}, 0x1, 0x0, 0x0, 0x8048094}, 0x8805) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="766016", @ANYRES16=r2, @ANYBLOB="000829bd7000fedbdf25060000002700070073797374656d5f753a6f626a6563745f723a747a646174615f657865635f743a7330000014000300fc01000000000000000000000000000008000400e0000002"], 0x58}, 0x1, 0x0, 0x0, 0x4004000}, 0x50) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x0, 0x400000, 0x1}, 0x3c) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYRES16=0x0, @ANYBLOB="10002dbd7000ffdbdf2501200000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000acccb1d8daec46c45261f8b90b76119f93a541c409d7b2aba515b60a0b06d78afd91fdaf"], 0x50}, 0x1, 0x0, 0x0, 0x24004000}, 0x40) 00:08:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1d02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:08:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1d03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2938.428182][T15687] device vlan2 entered promiscuous mode [ 2938.444175][T15687] device bond0 entered promiscuous mode [ 2938.450541][T15687] device bond_slave_0 entered promiscuous mode [ 2938.456887][T15687] device bond_slave_1 entered promiscuous mode [ 2938.473152][T15687] device bond0 left promiscuous mode [ 2938.497777][T15687] device bond_slave_0 left promiscuous mode [ 2938.506807][T15687] device bond_slave_1 left promiscuous mode 00:08:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f0000000280)={'gre0\x00', 0x1ff}) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001800", 0x1c) 00:09:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000061, 0x0) write$binfmt_misc(r1, 0x0, 0xc7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x1, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dbc, 0x47ff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000036930086c933ec97b20bcebd52363be293427dfb86d799c0536e11ba917529db0ce791528ec321d363a9fae90d4fc6d0c637146f50c0a9037f2229493f834d72a8f720df5424490a81549924a4ebd794", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0)=ANY=[@ANYRES32=r3, @ANYBLOB="1a5846fdcc9d1ba453626755a3d68d5b0d89e2f1c16444de53b0338296189e609a1a165852e7dbaa950af3c1fa715921f15a6bf4de89e42fa1f11c1615fd172b72ec3501815d7e3037da4527e7c49628bff19127473b18b3eab0b2d278dcda9e5f4c55c12454178b83146b6a362fc4d3d652cb17831ba73da9357b270000000077a2d6bb5f0db6858882f89cdf041ed2032e2e115ed8a84d0f235dead1a8b5913db7e485bcde8cfa503cb3fac00410bf26c800133b31d920e1f4d1f174a2a2ba1c56d000a966c0d89112408ec1db78a1e9c0315c4a17dbca75a7180e0198822e6aef7784f8fc375da0e4e8b85ffca52ec1458c8c79ec"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r3, 0x294}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000000c0)={r3, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x4, 0x425}, 0x90) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r4 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1e00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdf6281e4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001900", 0x1c) 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1e01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2939.097896][T15731] device vlan2 entered promiscuous mode [ 2939.143121][T15731] device bond0 entered promiscuous mode [ 2939.179991][T15731] device bond_slave_0 entered promiscuous mode 00:09:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$devlink(0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffd, 0x0, 0xb3550aa4ba878254}, 0x9c) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000080), 0x8) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="ee08aa49", @ANYRES16=r2, @ANYBLOB="040026bd7000fcdbdf250800000008000400ac1414aa2400070073797374656d5f753a6f626a6563745f723a7373685f657865635f743a733000"], 0x40}, 0x1, 0x0, 0x0, 0x8048094}, 0x8805) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="766016", @ANYRES16=r2, @ANYBLOB="000829bd7000fedbdf25060000002700070073797374656d5f753a6f626a6563745f723a747a646174615f657865635f743a7330000014000300fc01000000000000000000000000000008000400e0000002"], 0x58}, 0x1, 0x0, 0x0, 0x4004000}, 0x50) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x0, 0x400000, 0x1}, 0x3c) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYRES16=0x0, @ANYBLOB="10002dbd7000ffdbdf2501200000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000acccb1d8daec46c45261f8b90b76119f93a541c409d7b2aba515b60a0b06d78afd91fdaf"], 0x50}, 0x1, 0x0, 0x0, 0x24004000}, 0x40) [ 2939.206982][T15731] device bond_slave_1 entered promiscuous mode 00:09:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x18, 0x30, 0x1, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) [ 2939.258943][T15731] device bond0 left promiscuous mode 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1e02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2939.294893][T15731] device bond_slave_0 left promiscuous mode [ 2939.334415][T15731] device bond_slave_1 left promiscuous mode 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1e03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1f00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2939.540660][T15732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2939.781446][T15739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4041}, 0x4000008) r6 = socket(0x9, 0xa, 0x2) ioctl$SIOCRSACCEPT(r6, 0x89e3) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r7, @ANYBLOB="0200000000000000000000000800"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001a00", 0x1c) 00:09:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1f01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380)=0xffffffffffffffff, 0x69) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x3, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x398) socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0xa, 0x803, 0x20000000) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f00000008c0)=""/4096, &(0x7f0000000080)=0x1000) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000100)) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x59, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x64}, 0x4000000) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8983, &(0x7f0000000740)={0x7, 'bridge_slave_1\x00', {0x4}, 0x7fff}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000018c0)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="84dfecca9f17fd29b2701e5ddf71f69a02f3ecde586f27e963ffe002956a51e040c8cb79b534039c078de453b722781ea2e99322042f24821ed62314590512f1b5927e28f9af9fb3180071e0f4745a27fdb77f679245"], 0x50}}, 0x0) 00:09:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe0340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001b00", 0x1c) [ 2939.963327][T15774] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1f02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2940.023902][T15778] device vlan2 entered promiscuous mode [ 2940.033464][T15778] device bond0 entered promiscuous mode [ 2940.039166][T15778] device bond_slave_0 entered promiscuous mode [ 2940.046209][T15778] device bond_slave_1 entered promiscuous mode [ 2940.062921][T15778] device bond0 left promiscuous mode [ 2940.074441][T15778] device bond_slave_0 left promiscuous mode [ 2940.085996][T15778] device bond_slave_1 left promiscuous mode 00:09:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@can_delroute={0x34, 0x19, 0xd1b, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffff9}}, @CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "05807d4acf4781ad"}, 0x9}}]}, 0x34}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x1f03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2000}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2940.339563][T15780] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2940.349881][T15779] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 00:09:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x400802, 0x9, 0x0, 0xffffffffffffffff, 0xb}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xffffffffffffb, 0x11, r0, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r5 = accept$netrom(r1, &(0x7f0000000000)={{0x3, @default}, [@default, @null, @bcast, @null, @rose, @netrom, @netrom, @netrom]}, &(0x7f00000000c0)=0x48) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e22, @private=0xa010102}}) [ 2940.379854][T15780] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:01 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe1340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:01 executing program 1: unshare(0x40000000) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x104}}, 0x48001) getsockopt(r0, 0x100000, 0x8001, &(0x7f00000004c0)=""/4096, &(0x7f0000000080)=0x1000) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) r2 = socket(0x21, 0x8, 0x0) setsockopt$PNPIPE_INITSTATE(r2, 0x113, 0x4, &(0x7f0000000300)=0x1, 0x4) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000a80)=@newtaction={0x104, 0x30, 0x53b, 0x0, 0x0, {}, [{0xf0, 0x1, [@m_skbmod={0xec, 0x1b, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_SMAC={0xa}]}, {0xb4, 0x6, "cf0a58e0aad87173849f5e74d134cc2978f19d6bf9c8c04a42d9a7f6566051e0483fe0844ddd43172a626f520b3b5bced0589736668e45cd3967f6475a6f2ae95df3cfb8349c23511da0f862fd711af4380c937507ae5bda3111616a514a645568f94e31062c103d6fc32df2d8768e55427454e253b65c718de2cb2b2b56f59a7d858fda9a8499730cb6c5f3e76a357d2ad15780cedeaa046177f9d29320fbc5a2ed9c54cfe31acb3eb77819ecc6f71e"}}}]}]}, 0x104}}, 0x48001) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x88, r5, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_MFP={0x4}]}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x758}, @NL80211_ATTR_STA_WME={0x4c, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x81}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x80}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xff}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x80}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x5}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x8f}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x6}]}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xffef}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x2b}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 00:09:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001c00", 0x1c) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="0000000060be094cfc662a8d4cf9e25865cdbef7e4579f1f7944c7fffd4e9ee059c56974b78998415376f95341fd0c3260cd5e4f8750377fba4123e9d051981ffc277aadc0b0a00acfe0d113879738586480893b88a1072bf7fa89aadbee582ea34c96907a6940ef80c171d80f845cabb331d2647e0cf61291cca02659115f80b1bcc477c58623cb9c23ba05fcb6727be29c224de678936a2ac1525efb80513b7d4a9319d2a841426bca9b25ee0cc6c0e476cfb2d73ad6b53cc37b79e738e49aeb1ac15f285058bce22442a156e28dee8dd36295c99a1a6e0ca4fbf8940bfa26c7f0f7228cb78b549a2dac7d3258da", @ANYRES16=0x0, @ANYBLOB="00022dbd7000ffdbdf25140000000600ab000002000008001400", @ANYRES32=0x0, @ANYBLOB="0500c20000000000"], 0x2c}}, 0x40814) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xff, 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004010}, 0x20004000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2940.468817][T15803] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2940.546554][T15808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2940.574982][T15810] IPVS: ftp: loaded support on port[0] = 21 00:09:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000711c00", 0x1c) [ 2940.593809][T15815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 2: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe0340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2940.995961][T15818] device vlan2 entered promiscuous mode [ 2941.007288][T15818] device bond0 entered promiscuous mode [ 2941.014146][T15818] device bond_slave_0 entered promiscuous mode [ 2941.021531][T15818] device bond_slave_1 entered promiscuous mode [ 2941.033541][T15818] device bond0 left promiscuous mode [ 2941.039121][T15818] device bond_slave_0 left promiscuous mode [ 2941.054482][T15818] device bond_slave_1 left promiscuous mode [ 2941.175409][T15810] lo speed is unknown, defaulting to 1000 [ 2941.235622][T15810] virt_wifi0 speed is unknown, defaulting to 1000 [ 2941.266262][T15819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:02 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe2340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2941.374928][T15816] IPVS: ftp: loaded support on port[0] = 21 [ 2941.423822][T15816] lo speed is unknown, defaulting to 1000 [ 2941.483985][T15852] device vlan2 entered promiscuous mode [ 2941.499268][T15852] device bond0 entered promiscuous mode [ 2941.509457][T15852] device bond_slave_0 entered promiscuous mode [ 2941.520594][T15852] device bond_slave_1 entered promiscuous mode [ 2941.543194][T15852] device bond0 left promiscuous mode [ 2941.548507][T15852] device bond_slave_0 left promiscuous mode [ 2941.557688][T15852] device bond_slave_1 left promiscuous mode [ 2941.673601][T15816] virt_wifi0 speed is unknown, defaulting to 1000 [ 2941.835028][T16607] tipc: TX() has been purged, node left! 00:09:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00235172e041e6e6618d93bcfc633dd98009", 0x30) r1 = socket(0x21, 0x1, 0xc) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000240)=""/229, &(0x7f0000000340)=0xe5) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r6, 0xe32, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x200048d0}, 0x4000800) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f00000003c0)=0x401) r8 = socket(0x10, 0x800000000000002, 0xc) write(r8, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) 00:09:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001d00", 0x1c) 00:09:04 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="580000001400379b9fb61b47", 0xc}], 0x1) close(r1) socket$netlink(0x10, 0x3, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x54e7547e02afa628}, 0x80) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) splice(r2, 0x0, r1, 0x0, 0x4ffdc, 0x0) 00:09:04 executing program 4: getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000002c0)={r0, @in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0x7fff, 0x6, 0x3, 0x3, 0x80}, &(0x7f00000003c0)=0x98) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r8, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r9], 0x4}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000540)={0x54, r8, 0xb04, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xe08}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0xa}}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x40) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:04 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe3340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001e00", 0x1c) [ 2943.937515][T15927] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2944.162977][T15939] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2944.169715][T15925] device vlan2 entered promiscuous mode [ 2944.184810][T15925] device bond0 entered promiscuous mode [ 2944.191318][T15925] device bond_slave_0 entered promiscuous mode [ 2944.197953][T15925] device bond_slave_1 entered promiscuous mode 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2944.221401][T15925] device bond0 left promiscuous mode [ 2944.226707][T15925] device bond_slave_0 left promiscuous mode [ 2944.247161][T15925] device bond_slave_1 left promiscuous mode 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ppoll(&(0x7f00000000c0)=[{r7, 0x2000}, {r2, 0x2000}], 0x2, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={[0x3]}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:05 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmmsg$inet6(r2, &(0x7f000000a700)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7ff}, 0x1c, 0x0}}, {{&(0x7f00000001c0)={0xa, 0x4e20, 0xffffffff, @mcast1, 0xff}, 0x1c, &(0x7f0000001ac0)=[{&(0x7f0000000380)="d0860006dc4d59f32d25633b77d3aac7c62579b6293f32be368ee42cef301235", 0x20}, {&(0x7f0000001b40)="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", 0xffe}, {0x0}, {&(0x7f0000000840)="392182e242ec649bfe8dd884c9daad56ee6402372dd6379c75977a828a52917db42b7bcccf8e5112a617d4e3d5ac4c0fd80caaa0c84fcfbad7f701da3158b6d489989a83ca787f4b9bac9ce9d5482ca825acd59f359e7b6737e17c033ac924cf9686835f69e5c08ee976efd8654963b47b15ed8938be0c1a2e44898f3a1c325162d00f0e2c566b0737876fb88d05824f59369e1181301088e500236c68527980f6", 0xa1}, {&(0x7f0000001a40)="80a1be56d004914d772452dc20841efd6de61d81d7d4783281530ca73ced5ba4bfd3399206faaa0ff5b8634aa87df11ee9ff8e748a2a6a2f8e01b9ec3f64818bdd82f715aeeaf432670f96eaad57e6c8892a1705f8aa2cf3601af80f1064", 0x5e}, {&(0x7f0000002bc0)="68cd8e3ddef189d2a18bd3edc73dc78d1b519224932bfb2fca6e49d5d802f5db680f9c5e6f5d0a61d0f817f14c3a22446862ec67ad49b6ab7c4ab636e9bca7b5f54302ca4f096c6664e702eea9f7f1b656e23744ad05d1ee2ab6c48d774a2d8e09494f24c8de1d1a43baee71af289348db1bbb01f20046844d5ef74dbaee927053dfccbf4b0fa5ced989201da739bed6bc666188c27afacb48b03463a271e84ce6cebbc9faf9323052d5b10cd89f", 0xae}], 0x6}}, {{&(0x7f0000002b80)={0xa, 0x4e21, 0x5, @mcast1, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000003140)=ANY=[@ANYBLOB="140000206432f400290000000b0000000000000700000000140000000000000029000000340000000200000000000000"], 0x30}}, {{0x0, 0x0, &(0x7f0000003600)=[{0x0}, {&(0x7f00000031c0)="776700cb2883c3d3c6b1c6ccba8e3561ee6ef2d42acc714dfc02d7a34c92f23f948a19a48370f023ac262d7bc931cc198fcf70121b364b2909738528520abad75cc8967cfdff8657bdbc41201a598b8de0ec45d5e7fcaba7609494741383a814b233c8cc7da7be3c0204be8c7ee412465934545ca0da1a196a212cf2eec237fea83b7a0d246763a419f067e09d14d8f9fe1ed7477b32bfb1bea5730a02d57ca5ca", 0xa1}, {&(0x7f0000003380)="727357f406fc1bc9b805e9f966f657b9b042bcb9b4f987c72b439e89d9f705b129dd2420249e8e42b2b9c77c805ad72d25d3c7718f9d370a3ed88af677ba96279eb54c75a1a189449092fb", 0x4b}, {&(0x7f00000034c0)="8e7cd9b027c1b1a824a6ad58b85f969c7cca792e4e25848f61b18fe2f4573f080078fad414e053b8248aceafdf025dd13db8b498b211ebc66cfb454cd87eec61d6cc301b1b1c1c8431be4bd35b7042b81f6da293904b7b8f3b376bb8d6cde4fe0f510450060f0b2610a64b65916e10a2f6ade3ced8f57cee98f1da41b742788ddbc93542c4c6641ea7a28c8415cf20550cad5f48bc97a74c51c12a3f4c3490c364a27ddce47e70b8e1b1ee67050d", 0xae}, {0x0}], 0x5, &(0x7f000000a980)=ANY=[@ANYBLOB="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"], 0x12f8}}, {{&(0x7f0000004980)={0xa, 0x4e23, 0x6, @private2, 0x80000000}, 0x1c, &(0x7f0000005080)=[{&(0x7f00000049c0)="c9afdf3341212e0ebc5cbece55535a2e9bfb1deff1b17e4a8d9af53e88ea2d9d8bb80227e9d187ca1bc2dd2c5343cddf9b0bdacbce14", 0x36}, {&(0x7f0000004a00)="42526b9cf5aeed9bb742c28ef4034d2eeac77e4ab1f0c230b133f5ecba933c354ec085736aae1b813ad321eeb5ed082f1afeaf7c46e0bd44cbbac699e8ea79d8b3aa3891cbf1e3e0733c43b4f9998eda09735d435d56b6db833e2ba5f4b9b494ce8c06fba22fd2e921057e8e8f296c95ba810e21cc12ff4963a81a44b22bf88baf148cc7b7004dfaa8", 0x89}, {&(0x7f0000004ac0)}, {&(0x7f0000004bc0)="f36ba9bfb9cc43e689ddc233cfab185449e00e2f2a5cbc64775eab0458da29d0e2a74e848bdf154d51c7d392f1a12b5fa74da5fa46d59a8f16456ec6661ae5b51745507e29a63228cc97369a1f", 0x4d}, {&(0x7f0000004d40)="6da319f8e6cd21f10591c0da6ecbda1f0a309bd5589e8057a09ec0561bbf215c0834d695707cb0221d218c9a18e5dba29485df36baa7488010028e09af829da68a4d2a1a3b2bade26a33090d08fb5889057c4a38feaea9645edbdccfbacb856767769ef373ed72ddf55e1ea47189bdc3ec3150a516cb6a4081d664520545358985521e01dec8d8c99bc8c5e81a22600c69e3e400c55276d4ab443b199554a8a3949010afd6195e7c888f4b7e573946", 0xaf}, {&(0x7f0000004e00)}, {&(0x7f0000004e40)="c949bb69b9235dea7494c242b5917f433fd444edecf76ae046ffabf126c96307bba29eea27549b8bbb03f957d568b52a800cc0dfb446188b93eb4e1625b31bd25003b8f30a3629ef4bb8c4984df41b8109fd46f26e4167696782aad230fd8d3939223b613657557ce47c25dc4060a9f213fd50e820535879812f38a517cf3449c9", 0x81}, {&(0x7f0000004f00)="1c5b32627925de4b0bf46409b6dc6bebaaf3ee2a5af1b28b6c922c9a995cad96eee08e172c247dc768d6340bc9e261a764f57b0297689a53d78b1ecff1218e17e9e84e5b7cc28a65220664075b389974b6945f3b9ba4c5bdd4d100fb578a39515ea853622ba8fe47312b2e9d3fee22bb6ee0f9e66cfa092bd4bdce3a2adb6707d54003b4951c66f912393c55af2e43258a2d2c961eaa477ba11e675bb77899", 0x9f}, {&(0x7f0000005000)="58aec9c269982bf28c1165a6d4096e785f5a6c7f04ea87961dc30e819bf7a5bd2b56ec2d7884b1ca0efdb6508ce967567be8ef7cb75adff3c644980c54809ab17864f0d0079e3bbba1a5523b6f3a5c80bc3bee30", 0x54}], 0x9}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000005280)={0xa, 0x4e23, 0xffffff7f, @private1={0xfc, 0x1, [], 0x1}, 0xd187}, 0x1c, &(0x7f0000005700)=[{&(0x7f00000052c0)="a08fa15a60b211dec8701f7841bb601a1551c78d1fbacb5a3889480deb9f338b759176bdb613906b14504ac3c8287a0ca16ed2484fde28ddb0ed49eb446ada5c6876864074c569f5bba1683bdcdebd38d3522f26ec233cb47a045f78323279ac58916ffe75aaefb4a0e62e3f971bbd3dad427abbd5bc9660551c69c93718fcc3ee362c", 0x83}, {&(0x7f0000005380)="d5ff2d4a1b42c78a8aebb554dc2adc56f1646b8c0f20013c66c3bbae176f5f53037efb5f45e9987bbe65d90d4e9f77a364f4cc97bfd72c8497ec5b8f9ebd33c0e467fb83e9f8c88e554ce5e9f6e92b05f17385f2e481aeffb87cb77461820261eae4a2b38af20408fbe7681da007aa1bdac08eb0f2d6bbef4757588083948fce73bad431627ae82890bdf865fbed01e654c354f25a3ec21f3be97c35f3637cd51f51460895e309d617229294569ce66787d6aa1503472cfd9f3b0ca06161b757e9fbba6746cfcc0128644221509b952f8075ea", 0xd3}, {&(0x7f0000005480)="03a78bddf44352b5bf011e846de8e6b4112b3964dac3d9876df610b1a92ec00d70058b38eb54719b49036f4bb7dd24617b9712b0bd6430be54e05eac59599bf623f66235afde4869b21be172630a49822a19ff80ca442fc1199a8229fe185c39577fdd12f0", 0x65}, {&(0x7f0000005500)="4e45c152cd5e59a94a9ed3077b", 0xd}, {&(0x7f0000005540)="addea1ccd72cd824fb1142e7012e6213a1ba6b3c9c9a6327d80ae7fde44dbf7f3eb36bf6197388fdbdee8b136bd34b9aea7b9cca394c3ca2b6c7420eb093f7bdfbd12304b44cdb54483fb1882c5adf5520705493", 0x54}, {&(0x7f00000055c0)}, {&(0x7f0000005600)="b3cd04342aa71901845bf6e82a2d", 0xe}, {&(0x7f0000005640)="0a916f13d6ebe08f006480fb236256382ccd9bc3aba15210e3795d72c73fcacfef13234a351e8bbd4a9c9255bfe3b4159b41bb878d6e4aa71f53", 0x3a}, {&(0x7f00000056c0)="be1ce52dabcb1d0f1a9eea29e2a8e2e54d5b1ebc9cb980a0c3ef346a2b5e01b0b54067ab5b", 0x25}], 0x9, &(0x7f0000001940)=ANY=[@ANYBLOB="2400000000000000290000003200000000000000000000000000000000000001", @ANYRES32=0x0, @ANYBLOB="00942738000000280000000600000000000000390000002f0200ff00000000fe80000000000000000000000000000f2400000000000000000032000000fca000000000000000000000000000bb", @ANYRES32=0x0, @ANYBLOB="000000001400000000000000290000003e000000ff0700000000000014000000000000002900000034000000010000000000000024000000000000002900000032000000ff0200"/83, @ANYRES32=0x0, @ANYBLOB="0000000028e4ffffffffffff28000000390000000602020500000000000000b9c07e744d3b00000000000000"], 0xf8}}, {{&(0x7f0000005940)={0xa, 0x4e21, 0x3, @loopback, 0x1c00000}, 0x1c, &(0x7f0000006c40)=[{0x0}, {&(0x7f0000006980)="0a5c69d42bf9ac2a845faed261ceea094fd4b3776ccca6ffdb1c0bad3749374867b326edace4d59299fa0bb8366578372fc5b173d76b7dc3d6a9128b65a17e5c1ebfd255bb8afd301022b25dfdf8158d184c633f5ecc98bc937b8d5965f0b9c91286d9acb0dc8f2c3db942043d2ca5da5b01740197798799eb9ecd55d724db281bac", 0x82}, {&(0x7f0000006b40)="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", 0xfb}], 0x3}}, {{&(0x7f0000006c80)={0xa, 0x4e20, 0x0, @mcast2, 0x401}, 0x1c, &(0x7f0000008e80)=[{&(0x7f0000006cc0)="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", 0xfe0}, {0x0}, {&(0x7f0000000540)="e032065c506b036c65bd85d7dadd89dd9b2a7ad8ab21738e70c392c356b5ceb679d5f0b14a8e7e5cfc93e184f634e7d842f1d01c7339f0c168a4405094021536d4f0eb035ec92ee250480d5b28a43581fa4e91484b8c274769a93222f9161691ebd971978240d8e82b7934a88cb710e706becd659fad64c91f6aaa47441e84d9b32b47a9e0df062cc779704ea5b30515d5916968e26726", 0x97}, {0x0}, {0x0}], 0x5, &(0x7f00000003c0)=[@hopopts={{0x60, 0x29, 0x36, {0x84, 0x9, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xa}}, @jumbo={0xc2, 0x4, 0x6}, @jumbo, @hao={0xc9, 0x10, @private0}, @hao={0xc9, 0x10, @remote}, @jumbo]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @dstopts={{0xd8, 0x29, 0x37, {0x6, 0x17, [], [@pad1, @generic={0x6, 0xb1, "17618148bba87aaba5b23754eefd0f81eb8c6297779d7938e9cdec4f3f581ec035a9682f774f7235a6ca440341c97e318e844269657221464f0c8efd0ff45b5a0050d97522c6325ec8d0bcd1d03fd7b22b94a1e0591d319be7f4a3ced5e2d8cfa828169569e95aaf86768ced24a6280f52758aa2897a2d1e44c61b24f32ff8b089a72d33cb812df79145e1e1266c587a2de29b83f999a7cda1a01675267fd6ff0502b078f62629e7f62adeffde43d4feb0"}, @ra={0x5, 0x2, 0x1}]}}}], 0x150}}, {{&(0x7f0000009440)={0xa, 0x4e24, 0x100, @private1, 0xce000000}, 0x1c, &(0x7f000000a580)=[{&(0x7f0000009480)="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", 0xff1}, {&(0x7f000000a4c0)="4b334ae08e8210cf8a21b20d508c5ba41a4f7e1ce8bcda004a89801beb86c302a781aebcb675ac79ff46aa825cef138aaf94158dedfd579b1d4138c415e9c8bbdf67b8a377d7c332edd9324d5c8be68a2e316a895d85c07b8be0cb635a170feb5970313f2b2f0ff2c001c439aa62acc15118e3c224c2bde2223b64d0efc4903083707fdf61913cf32e7b8d8c324edf27734db22ecf4e2f3e7db0e5547619c5ee4db252833c2803", 0xa7}], 0x2, &(0x7f000000a640)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @dstopts={{0x20, 0x29, 0x37, {0x0, 0x0, [], [@pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x8ef3}}, @pktinfo={{0x24, 0x29, 0x32, {@private1}}}], 0x90}}], 0xa, 0x40000) sendmsg$sock(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) bind$xdp(0xffffffffffffffff, &(0x7f0000000900), 0x10) sendfile(r3, r4, 0x0, 0xf03b0000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6_sctp(0xa, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:09:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000001f00", 0x1c) 00:09:05 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe4340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:05 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200), 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e31032c05"], 0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000002300)={0x0, 'bond0\x00', {}, 0x7}) pipe(0x0) r4 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={&(0x7f00000016c0)={0x68, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xc}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffd}]}, 0x68}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00002bbd7000fddb070000000000000004000c040000040003801800028014000100ff0200000000000000000000000000010c00018020000900760000000800050000feffff"], 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="46db26da4cb431e5e2da3da410c6fd398e1a7fd66f00b8e16b999cd28e71097c22e5fb75eec88f3d"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'macvlan1\x00'}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000580)="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", 0xdfc}], 0x1) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2400}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2944.850244][ T27] audit: type=1804 audit(1597018145.881:2565): pid=15974 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 00:09:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2401}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2944.985708][ T27] audit: type=1800 audit(1597018145.911:2566): pid=15974 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16377 res=0 [ 2945.094091][ T27] audit: type=1804 audit(1597018145.921:2567): pid=15974 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 [ 2945.128392][ T27] audit: type=1804 audit(1597018146.111:2568): pid=15987 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 00:09:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2945.218099][T15965] __nla_validate_parse: 3 callbacks suppressed [ 2945.218108][T15965] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002000", 0x1c) [ 2945.265559][T15971] device vlan2 entered promiscuous mode [ 2945.305158][T15971] device bond0 entered promiscuous mode [ 2945.320535][T15971] device bond_slave_0 entered promiscuous mode [ 2945.326970][T15971] device bond_slave_1 entered promiscuous mode [ 2945.352330][T15971] device bond0 left promiscuous mode [ 2945.357649][T15971] device bond_slave_0 left promiscuous mode 00:09:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2945.387330][T15971] device bond_slave_1 left promiscuous mode 00:09:06 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000000001", @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ac0c000010000100", @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl2\x00', r6, 0x29, 0x3, 0x8, 0x1ee7560c, 0x0, @private1, @mcast2, 0x8000, 0x80, 0x8001, 0x859}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@mcast1, 0x79, r7}) r8 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) ioctl$sock_ifreq(r8, 0x8932, &(0x7f0000000040)={'batadv_slave_1\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaa8aaaaaaaaaaaaaaa8000010097e000000000000000000000000101004e20004590000000000000000000000000009cb4ad611cedb0de2ed93e2fff0b718a99bf5577f9069d59be94c3086b5024988071a6747b01bf9cf9a1b70ddbb151f776b1cf763228cbf17c8a678509a532139a62e7c8303e2478bf174a756da63fc5784401190e10221047de3e094b3d317e3e9e7996df53d22a00317509e049e4bc4997d77ebd558c6a74f2c7954dcd2de435aee8b1"], 0x0) 00:09:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2945.622427][ T27] audit: type=1804 audit(1597018146.651:2569): pid=15985 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 [ 2945.725424][ T27] audit: type=1804 audit(1597018146.671:2570): pid=15987 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 [ 2945.790371][ T27] audit: type=1804 audit(1597018146.791:2571): pid=16017 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3902/memory.events" dev="sda1" ino=16377 res=1 [ 2945.885721][T16002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000780), 0x4) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="00e9ffffffffffff0f0012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe48162df}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:07 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000040000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00270d00"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000591adeb10c0001007463696e6465780054000200400006003c0001"], 0x84}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) getpeername$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000340)=0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="72617700000000000000000000000000000000df4ff258d00e84000000000000002a2200002c2dc820930b62f16c57000002000000030000004002000000000000000000000000000008"], 0x1) splice(r5, 0x0, r7, 0x0, 0x1420000a77, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000000", @ANYRES32, @ANYBLOB="0000000001000000280012800a00010076786c616e00000018000280140003"], 0x3}}, 0x0) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfffffd88) 00:09:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002100", 0x1c) 00:09:07 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000980)="4c000000140081f87059ae08060c040010026b10400103fe0500418701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f566da388", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000001f80)=[{{&(0x7f0000000540)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)=""/98, 0x62}, {&(0x7f0000000640)=""/157, 0x9d}], 0x2, &(0x7f0000000740)=""/112, 0x70}, 0x5}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000840)=""/204, 0xcc}, {&(0x7f0000000940)=""/92, 0x5c}, {&(0x7f00000009c0)=""/190, 0xbe}], 0x3, &(0x7f0000000ac0)=""/103, 0x67}, 0x2}, {{&(0x7f0000000b40)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000bc0)=""/67, 0x43}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/102, 0x66}, {&(0x7f0000000d00)=""/242, 0xf2}, {&(0x7f0000000e00)=""/94, 0x5e}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/24, 0x18}], 0x7, &(0x7f0000001f40)=""/3, 0x3}, 0x8}], 0x3, 0x101, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r5, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@nested={0x34}]}, 0x48}}, 0x0) r6 = socket(0x9, 0x6, 0x7) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r6, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00f7097c55d96e9c0129bd7000fbdbdf2503000000080001000200000008000100020000000800010001000000080001000300000008"], 0x3c}, 0x1, 0x0, 0x0, 0x8001}, 0x191) sendmsg$NLBL_CALIPSO_C_LISTALL(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r7, 0x1, 0x70bd26, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x800) sendmsg$NLBL_CALIPSO_C_LISTALL(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r7, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x40c40d5) sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000002100)={&(0x7f0000002040)={0x10, 0x0, 0x0, 0x40110}, 0xc, &(0x7f00000020c0)={&(0x7f0000002080)={0x1c, r7, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000d0}, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2946.118215][T16037] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002200", 0x1c) [ 2946.246064][T16038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2946.266131][T16038] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2946.291922][T16040] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2946.353482][T16039] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2946.819686][T16046] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2946.830635][T16040] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2946.851899][T16043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2946.867332][T16043] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x81) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x80002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000880)={&(0x7f0000000340)="772bbad4f761edd93670a1ff5c48757076fa3df05754bdcf78ed51ca5dbaf7c608e73c4c715f5a9c318dd547f70aa75bd15d017ef88bf0262a6e4eb83521fb8ea7ddc1a4962755d4c1c6b49a8b0ff8dbba1c9d3a22d90c396503089a124cd5c3bca2079a7de61ccb2ca11495b592a43b8d86b1ad722d8ea5e2c5e7a57488bb7121a45922e476bb6cec13492dcdd275349f6f609628238958f7f6f723a62a501d3b07f90ca3cde35c6c25af087b04fce16396f6dd8becefcf4df8395af13481cfa576ae4c7a7df47800cde2cd89f50e2acca4274e5c46b6e628", &(0x7f0000000440), &(0x7f00000006c0)="f42e834d0458fb1e971c9f60d13d0c6cbea5311adf542f77709c62853d4a9c5737ee32ebd07d212fd9c3c8ea0c3699d4571532c891f2657802214ca1dbb14b5ffdf9ff3da72b777883ca781e8afb1546014d1a54768ed32b6276e5b267f99145690bd826800a053a2a6c884d72b864552efcde0de9c7ba2a5a74b4f5adc033d41473a35cc96740d98d85bd86118a94c9392288f05d39e08f5018ae48e6512c5db2c35fc6065bd3dfc96012e2deaa94277dd5a098dd6b05c1df1b23f6c5d90c591c764b5c226c18e9ee571e4300b2d7e1b24b13e3325d86997912bd", &(0x7f00000007c0)="9c014d6d15b1353458f1311222289af40969bfe174f88c01be22d926c68bb8aaa400c268afbfff88224df2f3a19da80eb7aaf83853559964d484a904511b3479c37b3c212204bb789e8b37070338bfd53e474acbb7dfa653ac00b3cba25bbdf7bf823c0fb23481b5b89b77662ece647963b5b55bfe58beb213b7491a4767c7c12761e50547d9bb17f10fbcc2c1828a3160e04ae95fdafa04acc80ccacf9b7058cf", 0x3f}, 0x38) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, 0x1411, 0x400, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x804) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c001a8018000a8014000700fe880000000000000000000000000001ed401001eae1dbb1b167237f61391b9030b7b2fb3aa9c880351d14d6c5b661afdcbccace99e64beba19509ed86a606a03e95944c18817b4a50eaa439a0cd17123b1884f2f675ae4ba08cf649e14b4dc7b5004716ec439249009af726c15879a2418519d3f02fdf74097a282a77400724c2238df9bf84dac32fdcaf5542479b59dca1db5526060afa32a8b12b04706405b6f8687c16f1847bbb872381aabb5b4574a6cd2bd848c0496f19232d32d86897ef7f010d3e106dd463046513ff0925c15460086d4e1c59d5402baf629ae56c164617fc74b5eba09979ba28f35c87e3cb327a758aff52293c1259d58a5d8374a354d88eb66445eaf592cb9c4b031e5770392f13c788cf37f9108e64f0559cebaa2b9eda56aa00"/324], 0x3c}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002300", 0x1c) 00:09:07 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="c800000010001fff020000001ff08843e3ffff80", @ANYRES32=0x0, @ANYBLOB="00000000000000009c0012001000010069703665727370616e000000880002001400060000000000000000000000ffffe0000002140007000000000000000000000800ffac1e0101080003008e000000040012f80700aeb7a40000000400120008000800000000001400060000000000000000000000ffff00000000140006000780000000000000000000000000000014000d00ff0200000000000000000000a4a2e6a00c000a00aaaaaaaaaa1c200014757c6d63098e6ea2f71a8e51f2cc9faedd3852a8fa4180d745bb77f96f30c462f33ef7e6f278c8cf"], 0xc8}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000100)=0x14) r7 = socket(0x10, 0x80002, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, r1, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_MAC={0xa, 0x6, @random="ee10b1a87a03"}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80000001, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) sendmmsg(r0, &(0x7f0000000000), 0xe303, 0x0) 00:09:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0x2d9c, 0xd, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1134, 0x3, 0x0, 0x1, [{0xa8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x88, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x164, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x7c, 0x6, 0x1, 0x0, "bc07bd0f8cb75b655f9863d9d9007a2a5383af91a09b1dd8d3327d5c4ac99cb048287bbdb92e99ae0ac158857d22fdf360bcb1a1c69f2482e108cd987f46f498785f71e153fe14c47724fce5b3dded60226ae40839477c6b49682fe672a730bd79cfb85ddc492953d52279945d8433bc4778a3f40559901d"}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x12}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0xc8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x12, 0x1, "eb8dc75b15f624921cf6b1513108"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x1f, 0x1, "30cf7e8350f41193e38d298279ceec99f2ae0ec6e53f277bed47f3"}, @NFTA_DATA_VALUE={0x1a, 0x1, "6c056e10d08da6e422c68dea7341cdeb9130726e4d28"}]}]}, {0x54c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x1a4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc1, 0x1, "0685628610fd0c181e4d4831386e5aa8cd448515a77f05639b4c3baecf6b3bce1f1f04965bb768abbf4e219acdf8d36dd90b73ed865be18fffeb0a52fe7e7523821772bca1979d75517cce8924e20fffd0f5a6c262681b10fc08edf0594575c6cafb887f7e7c6da94dafab75ad7764d7b845fbe6fe28ff59a72a561fc6ca9073e49d70e72afa073d496f589f9e0e0fe3313a7f14572eef8c142bd48f6a592e40147126f3989a8b7bc7e23553841a6183d86c4f6341116f6b15a7ae561e"}, @NFTA_DATA_VALUE={0xdb, 0x1, "87af8d87ed577ce54d3835706fa4a16eaa7260ae5755589dd843974b0fd6b02fd88394cace341cd63b46f2033200c714796d3dccbd970ca37312105c5ac7ac0f7b7be800bf0261be632b39fae07a0d437213c8587277b6b1220b39e884fc50f316b5439cde37cec998f99907eb17489ac250895117b680a7a617f0f6c6cd96bd15b42680647107b9a3d145720d9ce2895410a0ab62ed7679b43d02cf6f223adaaffca9e487596537d3630076333f99b3e65bc7a5c07f6f293fd332ab201f30e9efec57b91d98134447b7ab0ee1cdf1d96bbe3b145a98bc"}]}, @NFTA_SET_ELEM_KEY={0x39c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x101, 0x1, "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"}, @NFTA_DATA_VALUE={0x6a, 0x1, "d7674553b43418a050cfaeb19019fa3f4643564942497e3115565b4bb857667a581deee2ddbfe4a29a73912c237ec1d81e865fb7122cf44b8598961b5235f031c7e92a6baa4c8f0cb10f90d00ea82f64791ebca129bc3724893e3af951abcca1ce175c0d415c"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xb7, 0x1, "eb0b1ca7eda7bd06c5cbdf444e9d2d0da1468ae7dded068198eedb2ae5b74721e72e6d6d1beaa9d296cb3158c0c1453787383a6c738394be1baebe9fdc501b825684a43adb2a7faa5a74a054a47e17b949b87dbecbc93cb7135d18e6e9815cc21589e003d383637d84dd9b59ec63cd1763210dc23d5f035556668f89eef6bb4f837ba7b8f900378dbb50e686c9691b8f5a90d50500557a24b57e533e1a037db8192bb1c4813474073cfdad36226f32d50299aa"}, @NFTA_DATA_VALUE={0xe8, 0x1, "a7fc9045215cbd154ece7a4f27c2c1b11cf12e19d479cf9f674c189521e6e16d55c26b966cac844abfa3658ff061be726bf4347701f827c73dfed30f4d321504132fed65328d494e22898edb2244660af9ef9b98e52041a3631b1c91858ecac11d928e92896c34160bdb1ce3474e56bd9580c0ccf78e61a7254d5eea93b2ff25c66cc258687bc7718ab1ce6bdd1de6dbd4786dd684023e19012158e12bacaeac68f574eab8855658194ecf02fcd8d97b87c22887f2799568b50e0d96f1f3ae4b6b96a4fc53a6934432b20602ecdb06b208cd66f0334a70839b1bf888a7b2c7a6b58f2cca"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x288, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x27c, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd1, 0x1, "4b3712619886fdd6ccbd82274502f6e43019326474f2d5d9c47a6f8c0609a45b8089dff8d169e0816b4cd575a38bd68bd557d01a378c39f79182f379ede09696abde18c52d78784e721eb28329e92129579d9f7ff1b903ce84ade69a00a039f53870e531110aefe68d44da8d7776a3b2dc4c52a10aa04baa75141c0b2e3d527538c3581fed73b6291f48e21d76d6882c185ee286635638f86e12bb3c6f448b0838a5dc5a80916a03f9ce2f37ee4a36a80e009f3271798cac431117c6269de3002cbd097d71c857b1a7dfcf1360"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x5c, 0x1, "02a0ce9b90e5752157c32f8a998a660fb822901d88bbdb825ec7ba36be1081b15d5480c16db32150674bd46865cf3361db8b2bd2f4d0b5df77119400ac9319915a18e0521f022a25af71e2518885c294a2c5a1bf5d6399b5"}, @NFTA_DATA_VALUE={0xb3, 0x1, "4f6eb3445f33a6e32efc1eff61bea92cdfc2bb48fd32340e6063b741e1c1a055eee1b705292417915968eaa1214009e4b3d45b3b6690f88b7686255ea0a0048a92ce19e45be943657a80069cdeee71db52655239938f69f48f0c1b3fcd7e4cdd3278ffe4730b603a0748177d9f6d30ba8611340cbca93fea4fe63f1dbfe20afbb87c4d0903a87d86cb2ede7e2eba4ad0a21680b723cfb5ff7531bbf4ed3038321565279a898c718e3c53bd8ad3a64d"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffa}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff9}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x2ac, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY_END={0x274, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x56, 0x1, "d8fc524e87c0b5f2e65e280ff1ce28acad66a894064a24805755412f8b2275cd0cb356d5151691e4a407fe39e6eefa9d5ae706110ad21c5dd9564ac35816622c96a103ea5d5b3fa152b962daab6c52a05ab1"}, @NFTA_DATA_VALUE={0xd0, 0x1, "ec4f40c65b73e527124583dd96408400cefb819506f08fb78be674407c9387aa2dbb2760c758c421f78d93fc9a35ca54d980c10ed2973934444242935fb2fe6ffe910c26612bfb3cd339a69596def6c3e40de9209fc0698839e0eec812479d6ce83df17cb5b818bd5adb292c86a8a2cdb837491b662259b0dde9eaf01277cc66be70702a4a735f6e09209845aa3a4d3fd1c044f96df67b64f0fc2e9b6be6acdae75424523cdbd2899f69a097dc9eed9023e7ce831c47a6f4f3dc86e41da0a410dc2ac3a28ff76a069a1e42fa"}, @NFTA_DATA_VALUE={0xc4, 0x1, "49d03ba662434c5891884d15fa05f004420582fd6c990b8aa28d223edfd90618409aa99833220ea09dbb67aa654349d03f2d0989ea815ba58148b1eb39b89ca24eb5f81768d2574a779842bddb0e8c408abee9c47b635dd91b2433e22c196c7797786c8dabdbf7156b5015b0f0d8bffebb86b7bbe5343aeb85ee310897fba288a675d8dd5c66c399784f8ce215de8fe97fd6ce2a93840295057faeeed9c8aed3e3f27da7250cc7f066a6d44b649bd3eb87828de031dce2ee973f9a01b5f1bec3"}, @NFTA_DATA_VALUE={0x37, 0x1, "456b569bb0424d66573c808c516230b0bf9f7d1a1ff87ccac939e42ef917e4252e095ca6740897c775a5995cc9261beb2f9481"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}]}, {0x1e0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY_END={0x1d0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x102, 0x1, "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"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}]}, {0x194, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x94, 0x6, 0x1, 0x0, "86951bf3172c4ae03fedff962c177f3c851339ebad33410c1f9c2f67fe0b2eb4b2aa3b86414fe0b0ffb9e76c5a1e94772a48ad5f41dd74699551b657a6f7f449b4d30652bff49bb037e0663865b44623a8a2f971ea352cf32da206929dfb761bf55299504760f1c67521716af0b12ff08fc950ee7e160d6946abd1bdecfe70d7297c251de1b9ca57f7cd2aafd8676c7b"}, @NFTA_SET_ELEM_KEY_END={0xd0, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7ffffffffffffffa}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "63730cae861ac88dcfc8c771ac89b05eaf0bd247"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x120, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x11c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x83, 0x1, "45463b6e2eb7709acd5cc81ccae15f565f35285c30f197bfbed350b6b66edd0354af88d3a1206329b04bf62b9eb953ced59ec38de4fe05f4a9662f922f4248543865016e8d8a9c4297ca1777f996ef0f6984ea64720f9e939e61bb1ab470984169f29e24dad0f72feb462a24475a21702ef84736778dd1457c1021e40cd67a"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x5}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x9bfd91c9c80fda89}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c44, 0x3, 0x0, 0x1, [{0x274, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY={0x218, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x70, 0x1, "72e4ebf2a31b51c72daa18dc1a0a5560bae543351830b86985972febfc864442272dbfbd65062f21f21c3998f4506d385811dcde933a21c65fdc7c30147ec1262f848b8efb7a1db62baf45e66aa16898f2767059749436e52a0df3027ed8c687d80c27dd43e3c52686363196"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x9e, 0x1, "1dfd3fd450457e31b81e5a0bc6ce51502d722ab08a4840ace1567303b047facab20127f9bc69534a183f86f0fb0c8805343bb31ee0d6996854c822287e6d6bfb36c847025455232853c9f5f7cbda9bcecb7c06cb564b8b599f9703eecf7bf66a9534dfa6ec73d5567007129d6c318f80a6d5da8b1a85af51a8cbeefcbf0b2ad1ec1bc3b3e07d41e3f524d0656cbbdb057f3c1556e792bd3ad191"}]}, @NFTA_SET_ELEM_USERDATA={0x4c, 0x6, 0x1, 0x0, "fae8e86ce5e3a19e7aa1e7c04aad35582b6558e6cadacff37bd17f0a24e13f01f2ed2061df39a0197914a1c33c93c25108d26c2664502b7ab919b0be9a68770f15d49df5fa226af7"}, @NFTA_SET_ELEM_USERDATA={0x4}]}, {0x19cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x304, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xde, 0x1, "b0ef3953c638c99a3c22c2f256caf4b51a84c6edc82eb755d1ec34c7cdb18422c7551e685d979fbef6b5e009f1b9a50470ef48386ff2397088ee3fc78b832adde441671e21d84119dfa648cf319e957e062f18748751cd36491844cf73d6e9db44b45cee02ee99c34d1474e4565ba9edea65a1304e042a471fce175e1abce2b843ae5a99f659e808b8f7181d7114320b8a505c59309bc92053612dd6983f222c9966f4e29a476ab6a178006fe9c2810c11154a8d974b8c3c10152ba348a8ce9b9304fae2a285c663be69c2a86e0a1541305c8754f5bdc3191da4"}, @NFTA_DATA_VALUE={0x34, 0x1, "40500822fe63baa1c5e296bdc4bfb19e44bdb19de750d69cadaa1cd8654ebd555b2373dc0ab46b55f2c63516106d5c8f"}, @NFTA_DATA_VALUE={0x23, 0x1, "8ed0bbd1a2c2c5493d874a5260219c885455f630fb4daa9a4adbe5dc732d21"}, @NFTA_DATA_VALUE={0xdd, 0x1, "c487a116512d45fa0ab2db6b65b1e342f30b6f73567b2b25520955760145d8b36d2421c273c9a04d15b35ba113b47ad063297f9db72c94e1cf19b278e203faf5cb585a0cf1e8b417a25747c1949b6ae656e50bb7ee4048e2964c1439bfa2204ce13f9a929f77868625a032ef1f447bb4f7cc900afcc7673171e8659db542fa179873d791fd037cab7f6c3d380012668532b5e614ff2b13aad0bd2e9f4b130f128e976bca206c0248a218a99e415b019a113e9a87f20c45d04437544b4c5effb32887674c2fbae75776e5e138be08928dbe77e0efa515a5d1a8"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x9d, 0x1, "8044ea3c3616be25cbc144bbb7760394744594891a3558ac50f87cef53492446b57eec8ad3f0b22308cb093718d6dcf78f8e16436bb172ffe9429e15aea1650c4bfd3f67b9716f97e304e685fd5e7de030ec879591b84982da3172da0fe89c2fa867036e8e2e1865eaf07e7fd41998cf8ffa0e766e683837884b28ceb66c4fb12456345f8128eac9b7df6ef41dc57b63a4acf984978558ce29"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xf60}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY_END={0x1ac, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x46, 0x1, "0f71a78b879b4f8cc2db3b9f6300f6692dc5ce3de14e6664c755fa7159e58f73f11857149f4248e2391da5ae6917811db307eb74a76b6d99e492f46fe6d8642be4bf"}, @NFTA_DATA_VALUE={0xb1, 0x1, "307a470440452b20c3b57faaaba686dea0901cf9b66366d978900d6c1e3569eddbf8eefcab2d000d6d577fa3c35b5c8e88897210d029574ee8dcf7e3747c0676daef85e12dfb7130b05965eabc7a45a89654df46a2cd48ace83f8dfd7bda403a7282c46cdaba73bf2bee3047dbe5057ce40098e038d17aa320573a9eac33a9bde00fc2020d73d1dc56f6001a08811e2177f7b0868664b8abe5c0e7719429297e23b9c490201ac9d6469008a7d0"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_KEY={0x424, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x53, 0x1, "ed592307866bb55697460d0dd1b56342fe9fe3000770c4b99958a3ba2542be912b72ac1a464285444998b27bbc228f2d751f4071c733e91a1b8a8006f5a5012349d07ae4e1d15b295847fb0fe8a607"}, @NFTA_DATA_VALUE={0x20, 0x1, "02dc95f88faefbf52759b99442b58708948b87e57ccbc3680e8d4137"}, @NFTA_DATA_VALUE={0x68, 0x1, "6a14653796b8804d592faa0db3debdd192f8142105c74aeb0139f8691b86e80a79b2543f5975f954825bd2f22e43f509edd8258cd814c330c7f22fb103cdfb024da4ab1647032181a7a3055d7d0c6a248143be3f0290f425a72091edc255ff85742cbda5"}, @NFTA_DATA_VALUE={0x88, 0x1, "04c831006bde82203ce5aa4cd0f790629963a077eae0c284451ef54fd166ba414f843f50f80152141afc501a68097951e7116f25b1a6c8295baf4fb1f947dc4fd0c5ea5058b9b929c17784212e2c0a754ff0123c1c4e9fe9f51c78464d7504ce964e9822f2d282dbc22d7c3ee2df60acd011fb5c0052e3119a576db6742da384b340cb19"}, @NFTA_DATA_VALUE={0xc0, 0x1, "73c93309a71ff80a0b8179ed7017586ee41b7dadcf891907572385707ceb32193f822d28b9c7c88ea0a74ea4aaf624f8e087fe12ec10e628e4628b294fa5d217f4d91fa5fb083a73834b3dac6d53b29e1ce680e26531df0aaaf1c9a62f4db1186ec7a7e5dc04328de7ef1d3a4dd891a61cfa7368a1ae976cdd48372c81e55d6dfe75778ae1a52c9b1c11470daccacd252538494bd2d19d0be564e3c59b3644710c2696ac4bbfbd3484d73031d3cdb83b548ab9153c220ec7213228bf"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x102, 0x1, "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"}, @NFTA_DATA_VALUE={0x5d, 0x1, "216af606fc085204a1f4979ec0aeb43d10e29239840ade4f6d9ca6a72c25421b797baf78ba3c62adc25e8e7a4e34e877f1c4e4fd429b3d0970c5e68998485fea56b433b7ecabccde004c1dac839cc8974025daf83148ca43f5"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x6}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffffffffffffff80}, @NFTA_SET_ELEM_KEY_END={0x10b4, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x19, 0x1, "000cf862145fd4d2228714db71a9e117aac6a901a2"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x33, 0x1, "6d6ef0461af2e24eb25acf0768d2c68df9147bd612570df780dcfec24cfb70dc6882da2e301375326d401ebb7a68ab"}]}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, 0x2d9c}, 0x1, 0x0, 0x0, 0x40800}, 0x20004000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x288, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40200, 0x1}, [@IFLA_PHYS_PORT_ID={0x17, 0x22, "5ec7e8a5fee2ce835ebe21bb87ac16b4c62974"}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x8005}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x3}, @IFLA_VF_PORTS={0x228, 0x18, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1962daddead7ba69862cb2242146109f"}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "df99935d508701a983494a1764feae68"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b7f98522cd048676fcc6fe1bdb8f7998"}, @IFLA_PORT_VF={0x8, 0x1, 0x1009}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4a7ba5106edab07983beac1db2e14394"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "781bcb23b6dcfd14512c2d7a3b2d3e7b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0ca3bf3fd9c5fe76553c6b1fa48b5516"}]}, {0x7c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "5ba4325547cf16346b988d201d764a54"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "24ae5a3b13ddf97cbc83b79ed30dec4d"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "64a5637df6393a34611a6f48d3df5c3e"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4ff3f37b4a919cc6651ab2aa5b26259f"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "08e171aa1581d7bfc67a55f0046045e9"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x20}, @IFLA_PORT_PROFILE={0xa, 0x2, ')(:/#\x00'}]}, {0x70, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x9, 0x2, '{^&[\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\\,\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9616fc647210baa3832a5bfed68b7737"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "65921587974c53f1a0f53624ffe6303b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "17fa36ec4e18284ae5a85366a1a653cb"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x20}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3f6e00c51d921c5d1e78bddca9273fff"}]}, {0x8c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "682b3e12175b995b0f03f715b3efff6a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "272031496cc526042fcb54ffd3b1f318"}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ecb03aeee5ce4ea8ed29fbd5eb313960"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "83f34f2ed00938a2a9db73c6a2dc944d"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7d5ecd8aff6396f8ef1edc31bef032a2"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\'/:\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b5a8930552fb81edb6cef93c6dc8a571"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "a6aa452ca9e4e7d4549b233e803b63e4"}]}]}, @IFLA_PHYS_SWITCH_ID={0xe, 0x24, "ec011fa883f3fef22715"}, @IFLA_TXQLEN={0x8}]}, 0x288}}, 0x0) [ 2947.004584][T16078] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2947.115602][T16080] device vlan2 entered promiscuous mode [ 2947.122395][T16080] device bond0 entered promiscuous mode [ 2947.128132][T16080] device bond_slave_0 entered promiscuous mode [ 2947.135480][T16080] device bond_slave_1 entered promiscuous mode [ 2947.147077][T16080] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave 00:09:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002400", 0x1c) [ 2947.166186][T16080] device bond0 left promiscuous mode [ 2947.172747][T16080] device bond_slave_0 left promiscuous mode [ 2947.179153][T16080] device bond_slave_1 left promiscuous mode 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2800}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002500", 0x1c) 00:09:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x3, 0x3, 0x301, 0x0, 0x0, {0x4, 0x0, 0x7}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3f}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0xc0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r7, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x140c, 0x2, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x21}, 0x4c0c4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2947.784778][T16080] device vlan2 entered promiscuous mode 00:09:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', r4}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r6, 0x0, 0x100000001) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x7, 0x0, 0x1, 0x400, 0x1, 0x0, [], r5, r6, 0x2}, 0x40) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0xffffffffffffffff}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 2947.833067][T16080] device bond0 entered promiscuous mode [ 2947.838646][T16080] device bond_slave_0 entered promiscuous mode [ 2947.879111][T16080] device bond_slave_1 entered promiscuous mode [ 2947.907100][T16080] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 2947.931867][T16080] device bond0 left promiscuous mode [ 2947.939312][T16080] device bond_slave_0 left promiscuous mode [ 2947.954882][T16080] device bond_slave_1 left promiscuous mode 00:09:09 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe5340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341e9d75900df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@exit, @jmp={0x5, 0x0, 0xb, 0x4, 0xb, 0x100, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x81, 0x8a, &(0x7f0000000180)=""/138, 0x41000, 0x4, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xd, 0x10000, 0x825}, 0x10, r3, r4}, 0x78) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000000c0)='\\\x00', r5}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) 00:09:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002600", 0x1c) 00:09:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) close(r0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r6, 0x2f, 0x7, 0x6, 0x2, 0x20, @private1, @private1={0xfc, 0x1, [], 0x1}, 0x7800, 0x700, 0xb8e, 0x1}}) 00:09:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002700", 0x1c) 00:09:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000), &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x4}, 0x8) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f00000000c0)={0x2, 'bridge_slave_0\x00', {0x5}, 0x5}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2948.654897][ T27] audit: type=1804 audit(1597018149.682:2572): pid=16151 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir442499806/syzkaller.yHraxj/3397/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 2948.659257][T16153] device vlan2 entered promiscuous mode [ 2948.757720][ T27] audit: type=1804 audit(1597018149.732:2573): pid=16156 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir442499806/syzkaller.yHraxj/3397/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 2948.771976][T16153] device bond0 entered promiscuous mode [ 2948.796087][T16153] device bond_slave_0 entered promiscuous mode 00:09:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2948.805056][T16153] device bond_slave_1 entered promiscuous mode [ 2948.825143][T16153] device bond0 left promiscuous mode [ 2948.838230][T16153] device bond_slave_0 left promiscuous mode [ 2948.847383][T16153] device bond_slave_1 left promiscuous mode 00:09:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x94}, 0x8000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000002d00), &(0x7f0000002d40)=0x4) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002000128008000100736974001400028008000100", @ANYRES32=0x0, @ANYBLOB="081b01"], 0x40}}, 0x0) [ 2948.920187][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2949.467069][T16153] device vlan2 entered promiscuous mode [ 2949.475655][T16153] device bond0 entered promiscuous mode [ 2949.482046][T16153] device bond_slave_0 entered promiscuous mode [ 2949.488390][T16153] device bond_slave_1 entered promiscuous mode [ 2949.499050][T16153] device bond0 left promiscuous mode [ 2949.504474][T16153] device bond_slave_0 left promiscuous mode [ 2949.510788][T16153] device bond_slave_1 left promiscuous mode 00:09:10 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe6340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002800", 0x1c) 00:09:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffff, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffff, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) recvmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@nfc, 0x80, 0x0}}], 0x1, 0x2022, &(0x7f0000000100)={0x0, 0x989680}) r2 = socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfbb09446) ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)=0x68) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140cb98c831c000055", @ANYRES16, @ANYBLOB="02000000000000000000010000000800020000000000"], 0x1c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, 0x0}], 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r5, @ANYBLOB="b7d1be1da8769f42dbe0e24feb5f6a277bcee7165c0395bc7b9eb42cd9d32be7d346c0726c3e2a2186f43602a240834f12b014e5c12906260a150b558912df0089d3c6baf8c6a3fd8881f6625a50a4c16dce2abae8f555e6db896a5ae60188307d84971fe0678f5c0fb1eb7a691ac35f64f2e7e217f4200265af2e80ff69380efd6cdf9918e1da51a77e859efd6512e5c45e00"/162], 0x30}}, 0x0) 00:09:10 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @local}, 0xc) read(r0, &(0x7f0000000100)=""/238, 0xee) 00:09:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f00000000c0)) 00:09:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2a00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:10 executing program 1: pipe(&(0x7f0000000500)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) close(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) writev(r0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}], 0x3) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1eb) 00:09:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002900", 0x1c) 00:09:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2a01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2a02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2a03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2950.184759][T16208] device vlan2 entered promiscuous mode [ 2950.196890][T16208] device bond0 entered promiscuous mode [ 2950.203398][T16208] device bond_slave_0 entered promiscuous mode [ 2950.210539][T16208] device bond_slave_1 entered promiscuous mode [ 2950.226364][T16208] device bond0 left promiscuous mode [ 2950.233899][T16208] device bond_slave_0 left promiscuous mode [ 2950.251211][T16208] device bond_slave_1 left promiscuous mode [ 2950.572910][T16208] device vlan2 entered promiscuous mode [ 2950.583379][T16208] device bond0 entered promiscuous mode [ 2950.589035][T16208] device bond_slave_0 entered promiscuous mode [ 2950.606835][T16208] device bond_slave_1 entered promiscuous mode [ 2950.617271][T16208] device bond0 left promiscuous mode [ 2950.623622][T16208] device bond_slave_0 left promiscuous mode [ 2950.630178][T16208] device bond_slave_1 left promiscuous mode 00:09:11 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe7340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2b00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:09:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r10, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0xf0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r10, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}}, 0x4008054) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r5}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002a00", 0x1c) 00:09:11 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, 0x0, &(0x7f0000000340)) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e1d, 0xc1, @rand_addr=' \x01\x00', 0x1}, {0xa, 0x4e20, 0x7, @rand_addr=' \x01\x00', 0xfa7}, 0x8, [0x10000, 0x9, 0x2, 0x5, 0x59, 0x2, 0x10000, 0x1]}, 0x5c) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, 0x0, &(0x7f0000000340)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000000)={'lo\x00', r4}) socket$inet6(0xa, 0x0, 0x0) 00:09:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2b01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2950.843279][T16248] __nla_validate_parse: 15 callbacks suppressed [ 2950.843289][T16248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2950.864392][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2950.877606][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002b00", 0x1c) [ 2950.927490][T16252] IPVS: ftp: loaded support on port[0] = 21 [ 2950.936369][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2950.960120][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2b02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2951.006923][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2951.036293][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2951.091242][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2951.117870][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2b03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2951.143069][T16249] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2c00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1bbd000000db1c00010000000000006d3a09ffc2c65400"}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\r\x00', @ANYRES32=0x0, @ANYBLOB="08001b000031000000e63b9c4649cc69089d95fb5502683621d2eedc6310236f20f12cc2064bb01cad07c78b82b2ab273c5f8ec1d3aedf86e011f99c9c2e312a5edb6a437b7cbd95dd61cc2fb04494d5811688f5f028380dfad2bc809909"], 0x30}}, 0x0) r3 = socket$inet6(0xa, 0x3, 0x100) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r3, &(0x7f00000002c0), 0x4000000000000d7, 0x0) r4 = socket$inet6(0xa, 0x3, 0x100) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r4, &(0x7f00000002c0), 0x4000000000000d7, 0x0) r5 = socket$inet6(0xa, 0x3, 0x100) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendfile(r5, r1, &(0x7f0000000000)=0x800, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 2951.387359][T16256] device vlan2 entered promiscuous mode [ 2951.397536][T16256] device bond0 entered promiscuous mode [ 2951.415333][T16256] device bond_slave_0 entered promiscuous mode [ 2951.431672][T16256] device bond_slave_1 entered promiscuous mode [ 2951.454438][T16256] device bond0 left promiscuous mode [ 2951.467867][T16256] device bond_slave_0 left promiscuous mode [ 2951.491395][T16256] device bond_slave_1 left promiscuous mode [ 2951.649599][T16252] lo speed is unknown, defaulting to 1000 [ 2951.656504][T16252] virt_wifi0 speed is unknown, defaulting to 1000 [ 2951.668340][T16255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2951.683861][T16258] IPVS: ftp: loaded support on port[0] = 21 [ 2951.760503][T16258] lo speed is unknown, defaulting to 1000 00:09:12 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe8340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2c01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002c00", 0x1c) 00:09:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@bridge_dellink={0x28, 0x11, 0x400, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0xc8, 0x10800}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xf14}]}, 0x28}, 0x1, 0x0, 0x0, 0x48040}, 0x0) r5 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f00000000c0)=0xf000, &(0x7f0000000280)=0x2) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000200000000000300000000000000", @ANYRES32=r3, @ANYBLOB="20760000000000051c001a8018000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) 00:09:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e24, @local}, 0x8, 0x0, 0x0, 0x0, 0x93, &(0x7f00000002c0)='syzkaller1\x00', 0xfffffffffffffffb, 0x4, 0xfff8}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) pipe(&(0x7f0000000400)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r6 = accept4$llc(r5, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x80800) connect$llc(r6, &(0x7f0000000280)={0x1a, 0x334, 0x0, 0x8, 0x4, 0x7, @remote}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000300)={'bond0\x00'}) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0xa, 0x0, r1}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) [ 2951.986930][T16305] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2952.110160][T16306] device vlan2 entered promiscuous mode [ 2952.129317][T16306] device bond0 entered promiscuous mode [ 2952.135854][T16306] device bond_slave_0 entered promiscuous mode [ 2952.142832][T16306] device bond_slave_1 entered promiscuous mode [ 2952.155259][T16306] device bond0 left promiscuous mode [ 2952.160747][T16306] device bond_slave_0 left promiscuous mode [ 2952.166777][T16306] device bond_slave_1 left promiscuous mode [ 2952.267909][T16305] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2952.292821][T16258] virt_wifi0 speed is unknown, defaulting to 1000 [ 2952.429128][ T647] tipc: TX() has been purged, node left! 00:09:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:09:13 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe9340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002d00", 0x1c) 00:09:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x4, 0x6) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f0000000300)=""/143, &(0x7f00000003c0)=0x8f) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000010002a04000006000000000000000000", @ANYRES32=r3, @ANYBLOB="03200012800800fdfa736974001468028008000100", @ANYRES32=r5, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000740)={0xa4, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0x87}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_NETMASK={0x6, 0x9, 0x24}]}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x0, 0x9, 0x8000}, @IPVS_DEST_ATTR_ADDR={0x0, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x0, 0x4, 0x3ff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0x20}, @IPVS_DEST_ATTR_ADDR={0x0, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x26}}, @IPVS_DEST_ATTR_WEIGHT={0x0, 0x4, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x0, 0x4, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x0, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000}, 0x1) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@ipv6_getaddrlabel={0x5c, 0x4a, 0x200, 0x70bd2a, 0x25dfdbfe, {0xa, 0x0, 0x10, 0x0, r9}, [@IFAL_LABEL={0x8, 0x2, 0x2435a6906f857058}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_LABEL={0x8, 0x2, 0xb}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x5c}}, 0x0) 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2c02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:13 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffff0008000000000000910000008100000008004500001400000000006c907800000000ac1414bb"], 0x2a) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2c03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002e00", 0x1c) [ 2952.635118][T16367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2952.693161][T16363] device vlan2 entered promiscuous mode [ 2952.706594][T16363] device bond0 entered promiscuous mode [ 2952.714977][T16363] device bond_slave_0 entered promiscuous mode [ 2952.727949][T16363] device bond_slave_1 entered promiscuous mode 00:09:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r6, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0xf0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r6, 0x0, 0x70bd2c, 0x7, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}}, 0x20000c00) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x5c, 0x2, 0x6, 0x5, 0x0, 0xf000, {}, [@IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x5c}}, 0x0) 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2d00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2952.748180][T16363] device bond0 left promiscuous mode [ 2952.756411][T16363] device bond_slave_0 left promiscuous mode [ 2952.778890][T16363] device bond_slave_1 left promiscuous mode 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2d01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2d02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2d03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2953.066877][T16386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2953.097455][T16380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:14 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xea340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2e00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000002f00", 0x1c) [ 2953.209021][T16390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2953.271589][T16413] device vlan2 entered promiscuous mode [ 2953.281907][T16413] device bond0 entered promiscuous mode [ 2953.297951][T16413] device bond_slave_0 entered promiscuous mode [ 2953.327212][T16413] device bond_slave_1 entered promiscuous mode [ 2953.338510][T16413] device bond0 left promiscuous mode [ 2953.345947][T16413] device bond_slave_0 left promiscuous mode [ 2953.353108][T16413] device bond_slave_1 left promiscuous mode [ 2953.699166][T16413] device vlan2 entered promiscuous mode [ 2953.708028][T16413] device bond0 entered promiscuous mode [ 2953.716127][T16413] device bond_slave_0 entered promiscuous mode [ 2953.724869][T16413] device bond_slave_1 entered promiscuous mode [ 2953.734698][T16413] device bond0 left promiscuous mode [ 2953.740175][T16413] device bond_slave_0 left promiscuous mode [ 2953.746229][T16413] device bond_slave_1 left promiscuous mode 00:09:14 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) mmap(&(0x7f0000600000/0x3000)=nil, 0x3000, 0x5, 0x400000000005e831, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd"], 0x6) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0xfef0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x3c, r6, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) bind$pptp(r5, &(0x7f0000000380)={0x18, 0x2, {0x3, @private=0xa010102}}, 0x1e) sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r6, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x20044011) bind(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @multicast, 'bridge_slave_1\x00'}}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES16=r4, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'ip6gre0\x00', {0x5}, 0x648}) 00:09:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0xb871, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @local}}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f41f4cbace7f9a7df0200000000e80001dd0000040d000d00ea1100000005000000", 0x29}], 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14004208}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x51ee}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40845}, 0x0) socket(0x2, 0x5, 0x8) 00:09:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r6, @ANYBLOB="26ac1414aa000000"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2e01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000003000", 0x1c) 00:09:15 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xeb340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2953.921019][T16431] IPVS: ftp: loaded support on port[0] = 21 [ 2953.943138][T16435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2e02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000003f00", 0x1c) 00:09:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2e03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000655800", 0x1c) [ 2954.235650][T16446] device vlan2 entered promiscuous mode [ 2954.258948][T16446] device bond0 entered promiscuous mode [ 2954.275544][T16446] device bond_slave_0 entered promiscuous mode 00:09:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @remote}, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x80000000000, 0x8000000}) [ 2954.285403][T16446] device bond_slave_1 entered promiscuous mode [ 2954.303321][T16446] device bond0 left promiscuous mode [ 2954.308769][T16446] device bond_slave_0 left promiscuous mode [ 2954.323471][T16446] device bond_slave_1 left promiscuous mode 00:09:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2f00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2f01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2954.615793][T16431] lo speed is unknown, defaulting to 1000 [ 2954.622768][T16435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2954.808558][T16470] IPVS: ftp: loaded support on port[0] = 21 [ 2954.916331][T16462] netlink: 'syz-executor.1': attribute type 13 has an invalid length. [ 2954.934993][T16466] device bridge657 entered promiscuous mode [ 2954.971097][T16431] virt_wifi0 speed is unknown, defaulting to 1000 [ 2954.988928][T16457] device bridge657 left promiscuous mode [ 2955.184492][T16470] lo speed is unknown, defaulting to 1000 [ 2955.196051][T16470] virt_wifi0 speed is unknown, defaulting to 1000 [ 2956.464179][T30933] tipc: TX() has been purged, node left! [ 2956.475907][T30933] tipc: TX() has been purged, node left! 00:09:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@ipmr_newroute={0x24, 0x18, 0x300, 0x70bd2d, 0x25dfdbfc, {0x80, 0x20, 0x30, 0xdf, 0xfe, 0x1, 0xfe, 0x5, 0x800}, [@RTA_MARK={0x8, 0x10, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0xc8e0}, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{&(0x7f0000000280)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)=""/26, 0x1a}, {&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f00000003c0)=""/129, 0x81}, {&(0x7f0000000540)=""/71, 0x47}, {&(0x7f00000005c0)=""/149, 0x95}], 0x5, &(0x7f0000000340)=""/24, 0x18}, 0x4}], 0x1, 0x10000, &(0x7f0000000740)={0x0, 0x3938700}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x0, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000780)=ANY=[@ANYBLOB="40040000000039040000000000003f239a110a4caedc93f59b960f000000000000", @ANYRES32=r8, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r10, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2f02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000006000", 0x1c) 00:09:18 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001fc0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0xc, 0x2, 0x0, 0x1, [@__IFLA_CAIF_HSI_QHIGH_WATERMARK={0x8}]}}}]}, 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x12) 00:09:18 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xec340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:18 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000000900)) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3e}}, {0x2, 0x4e24, @local}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x28a, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='sit0\x00', 0xfff, 0x1, 0x100}) 00:09:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000507000000000000000008000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000000)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x20c, 0xbe24, 0x3, r9}, &(0x7f0000000280)=0x10) 00:09:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000586500", 0x1c) 00:09:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x2f03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3000}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2957.214733][T16537] __nla_validate_parse: 1 callbacks suppressed [ 2957.214742][T16537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2957.262009][T16536] device vlan2 entered promiscuous mode [ 2957.296971][T16536] device bond0 entered promiscuous mode [ 2957.304209][T16536] device bond_slave_0 entered promiscuous mode 00:09:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2957.321211][T16536] device bond_slave_1 entered promiscuous mode [ 2957.337862][T16536] device bond0 left promiscuous mode [ 2957.345723][T16536] device bond_slave_0 left promiscuous mode [ 2957.358923][T16536] device bond_slave_1 left promiscuous mode [ 2957.529183][T16539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2957.552527][T16545] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2957.594064][T16556] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 2957.665646][T16539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2957.711409][T16561] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops [ 2957.718526][T16545] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2957.908220][T16549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000001c7100", 0x1c) 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:19 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xed340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000001) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x80) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000002) 00:09:19 executing program 2: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r3, @ANYBLOB="0000000000000000040000000b000100666c6f776572000014000200100054800c"], 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) listen(r4, 0x4) 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2958.180079][T16613] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000008100", 0x1c) [ 2958.335851][T16610] device vlan2 entered promiscuous mode 00:09:19 executing program 1: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000001000010400000000d6f4072aa7ad8a78079857d502f3997791b6d06afc5159de9654fb903516984b9b699a377be1f65b8c8731317e8defc47fc44800a5ecc590ccec571d1a7493b9e675e6c256e973318eae3861a3f0ba7d042646a4b1f39c57c3f8bf964273ada272e163522c2e075dd09c7fa45196d2213d90b93a370c5482788470e4bfbecc2814a05764ae706fa61550cb727b70d71f7a5b8f53916b06cfe1d9041ff8f4146d351aeb67e8128bc5cbf8c2dee3b07051d14c05ffa0f432898f491eae7a1ae5f55a242046a24f274b8624e2327bbcb7217785b9b9db78e5ec23b0d1c8fb49a3d69bb34a44848c133f7a10d9", @ANYRES32=r0, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0x4, 0x240000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r0}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000003cc0)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000003d40)=0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd"], 0x6) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)=ANY=[], 0x4c}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000003e80)={&(0x7f0000003d80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000003e40)={&(0x7f0000003dc0)={0x5c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x64}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x76}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000021}, 0x44040) unshare(0x6c060000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x104cd6a550aa9e61, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f0000000000)={0x4000000}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x10002, 0x0, 0x0, 0x61}, 0x28) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2958.395942][T16610] device bond0 entered promiscuous mode [ 2958.427558][T16610] device bond_slave_0 entered promiscuous mode [ 2958.461335][T16610] device bond_slave_1 entered promiscuous mode [ 2958.495750][T16629] IPVS: ftp: loaded support on port[0] = 21 [ 2958.504860][T16610] device bond0 left promiscuous mode 00:09:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0xf000) sendfile(r6, r7, 0x0, 0xf03b0000) r8 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001480)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r7, &(0x7f0000001540)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000014c0)={0x2c, r8, 0x1, 0x70bd26, 0x25dfdc03, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004800}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r8, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20002800}, 0x4081) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r8, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x48013) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03400000000002002000128008000100733f6c044ebb1abdef0b2969972158dd80ac83e6aaa679b8f8e160ee5961cd36b823f45872dfe34e8beeb83f8f9f626bff31556e8110e65d731bd6d4e1bab8d3b41828238666e3afe2e0e94cc82104b3fba423d66051435117674bf2b5000000000000000000", @ANYRES32=r9, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2958.522730][T16610] device bond_slave_0 left promiscuous mode [ 2958.535836][T16610] device bond_slave_1 left promiscuous mode 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000000ec000", 0x1c) [ 2958.814177][T16634] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2958.850208][T16613] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2958.870476][T16629] lo speed is unknown, defaulting to 1000 [ 2958.897162][T16629] virt_wifi0 speed is unknown, defaulting to 1000 [ 2958.947805][T16610] device vlan2 entered promiscuous mode [ 2958.967839][T16610] device bond0 entered promiscuous mode [ 2958.974151][T16610] device bond_slave_0 entered promiscuous mode [ 2958.982720][T16610] device bond_slave_1 entered promiscuous mode [ 2958.994449][T16610] device bond0 left promiscuous mode [ 2959.002852][T16610] device bond_slave_0 left promiscuous mode [ 2959.009637][T16610] device bond_slave_1 left promiscuous mode [ 2959.206571][T16637] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:20 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xee030000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendto$inet6(r3, &(0x7f0000000300)="02af437d10149c892459f18dc4e19b14cdeafde2538f3b818f126534bd04d4913e710e", 0x23, 0x400c0d0, &(0x7f0000000340)={0xa, 0x4e22, 0x8, @local, 0x7}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x88, 0x3ed, 0x10, 0x70bd28, 0x25dfdbfc, "3dadd991400b32921307d67233291a954f9a6914cf0e303a1c315723a9d3341dad7c1998e62aaad712a15a451abf936b34a08eb9cc54d2af5035b9404f7a038d38369508d2a7d7ecdccaa17771f2456d5a5f15697b6ab7d8eb75dd4f5bfa631bfd52bc603950bd0bd22aa303e2daa11246cdcae6f6", ["", ""]}, 0x88}, 0x1, 0x0, 0x0, 0x8044}, 0x8000) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c0000001000850600000000fe612239c24a0000", @ANYRES32=r7, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64"], 0x3c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@local, 0x0, r7}) 00:09:20 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000000f000", 0x1c) 00:09:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000000c0)={@mcast1}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2959.295304][T16631] IPVS: ftp: loaded support on port[0] = 21 [ 2959.387013][T16631] lo speed is unknown, defaulting to 1000 [ 2959.781402][T16631] virt_wifi0 speed is unknown, defaulting to 1000 [ 2960.178455][T16676] device bond17 entered promiscuous mode [ 2960.892227][T30933] tipc: TX() has been purged, node left! 00:09:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3fb, 0x100, 0x70bd29, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4010}, 0x40000) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) r3 = socket(0x2a, 0x0, 0x0) recvfrom$packet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x40) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x820004}, 0xc, 0x0}, 0x4000) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x9, 0x800000271}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000001340)="7e10", 0x2}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x80}) 00:09:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000000ff00", 0x1c) 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:23 executing program 2: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xed340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:23 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xee340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) socket(0x22, 0x6, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0xfdb6, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32=r6, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r6, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, 0xf, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x101}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x8084) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x2, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000004003", 0x1c) 00:09:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvfrom$llc(r2, &(0x7f0000000280)=""/164, 0xa4, 0x2123, &(0x7f00000000c0)={0x1a, 0x337, 0x20, 0x81, 0x4, 0x8, @remote}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2962.129228][T16777] device vlan2 entered promiscuous mode [ 2962.164175][T16777] device bond0 entered promiscuous mode [ 2962.181362][T16777] device bond_slave_0 entered promiscuous mode [ 2962.209564][T16777] device bond_slave_1 entered promiscuous mode 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2962.264997][T16777] device bond0 left promiscuous mode [ 2962.287372][T16777] device bond_slave_0 left promiscuous mode [ 2962.321526][T16777] device bond_slave_1 left promiscuous mode 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:23 executing program 1: r0 = socket(0x2b, 0x800, 0x100) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000001300)={'ip6gre0\x00', &(0x7f0000001280)={'syztnl2\x00', 0x0, 0x29, 0x40, 0xff, 0xa7, 0x0, @remote, @private2={0xfc, 0x2, [], 0x1}, 0x1, 0x10, 0x100, 0x7ff}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x29, 0x4a, 0x7, 0xd1, 0x1, @ipv4={[], [], @broadcast}, @loopback, 0x80, 0x80, 0x7, 0x3758da9f}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000001540)={'ip6tnl0\x00', &(0x7f00000014c0)={'syztnl1\x00', 0x0, 0x29, 0x4, 0xc0, 0x6c32, 0x20, @private0={0xfc, 0x0, [], 0x1}, @empty, 0x40, 0x7, 0x168a, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000001600)={'ip6gre0\x00', &(0x7f0000001580)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x1d, 0x8, 0x0, @local, @loopback, 0x20, 0x10, 0x0, 0x8000}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0}, &(0x7f0000001680)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000002c00)={'syztnl1\x00', &(0x7f0000002b80)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0xfe, 0x0, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x20, 0x7f20, 0x6, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002dc0)={'erspan0\x00', &(0x7f0000002d40)={'gre0\x00', 0x0, 0x20, 0x8000, 0x200, 0x3ff, {{0x18, 0x4, 0x2, 0x9, 0x60, 0x68, 0x0, 0x3f, 0x29, 0x0, @multicast2, @multicast2, {[@timestamp_prespec={0x44, 0x1c, 0x93, 0x3, 0x8, [{@broadcast, 0x5}, {@remote, 0xc50b}, {@loopback, 0xa1fc}]}, @noop, @noop, @ssrr={0x89, 0x2b, 0x60, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @rand_addr=0x64010100, @empty, @multicast1, @remote, @remote, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @noop]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003700)={0x0, @rand_addr, @multicast2}, &(0x7f0000003740)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000003800)={'syztnl2\x00', &(0x7f0000003780)={'syztnl0\x00', 0x0, 0x13ab0d3bd4df47e3, 0x9, 0x2, 0x8, 0x6, @rand_addr=' \x01\x00', @local, 0x1, 0x80, 0xf70}}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000003840)=0x0, &(0x7f0000003880)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003900)={{{@in=@private, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000003a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000003b40)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000003c00)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x2000000}, @rc={0x1f, @fixed={[], 0x10}, 0x5}, @xdp={0x2c, 0xd, 0x0, 0xe}, 0x3, 0x0, 0x0, 0x0, 0x8, &(0x7f0000003bc0)='bridge0\x00', 0x101, 0x9, 0x6}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005080)={'hsr0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000050c0)={{{@in6=@private2, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private1}}, &(0x7f00000051c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000005280)={'ip6gre0\x00', &(0x7f0000005200)={'syztnl1\x00', 0x0, 0x4, 0x81, 0xff, 0x2, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @mcast2, 0x20, 0x40, 0xd46, 0x5}}) getsockname(0xffffffffffffffff, &(0x7f00000052c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000005340)=0x80) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000005400)={'sit0\x00', &(0x7f0000005380)={'sit0\x00', 0x0, 0x23, 0x1, 0x4, 0x59e9, 0xa, @private2={0xfc, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x15}, 0x700, 0x700, 0x4, 0x8000}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000005fc0)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000005f80)={&(0x7f0000005440)={0xb34, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r1}, {0x268, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xb727}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1f}}}]}}, {{0x8, 0x1, r5}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x800, 0x9f, 0x40, 0x5}, {0x7f, 0xff, 0x36, 0x1}, {0xffff, 0x1, 0x7, 0xffffff7f}]}}}]}}, {{0x8, 0x1, r9}, {0x200, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x84ad, 0x40, 0x9, 0x8000000}, {0x7f, 0x0, 0x6, 0x2}, {0xff, 0x7f, 0x3, 0x10000}, {0x1, 0x31, 0x7, 0x1ff}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r10}, {0x88, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r11}, {0xcc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r12}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0xe3, 0x2, 0xf9, 0xfffffffc}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r18}}}]}}]}, 0xb34}, 0x1, 0x0, 0x0, 0x288c4}, 0x4081) 00:09:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000340", 0x1c) 00:09:23 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x1084) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000010000104000000000028fbae260000002eb302574477b4012f4e66d75aab062d31ba159cd1b23c8dedfc280cde2fed15e5801a48b14595c8fe08a3bfb9d8739d8edb42b6205efcb7e58359647071cb7cd05617532ecc75eda02bcb4c4c546a721ab1b8567803b777a44b962e026f290f414a1d1ae31ec98e75caa2", @ANYRES32=0x0, @ANYBLOB="43c7000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r6, @ANYBLOB="0a004f47a5ea0100aaaaaaaa320f051c96f57e10f0b31276d0bdf0c35bbbf35b9c1039ea2a1f984364"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x4, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0177010000000000040014001400030074756e6c3000000000000000000000000a000100aaaaaaaa3daa0000"], 0x44}}, 0x0) 00:09:24 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xef340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10100}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x1}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}]}}}]}, 0x44}}, 0x0) 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3400}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2963.290503][T16817] __nla_validate_parse: 4 callbacks suppressed [ 2963.290514][T16817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:24 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000fffff0", 0x1c) [ 2963.353853][T16818] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:24 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0xffff, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockopt$ax25_int(r6, 0x101, 0x8, &(0x7f00000000c0), &(0x7f0000000280)=0x4) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r10}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3401}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2963.465647][T16819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2963.564370][T16831] device vlan2 entered promiscuous mode [ 2963.602499][T16831] device bond0 entered promiscuous mode [ 2963.611185][T16831] device bond_slave_0 entered promiscuous mode [ 2963.626118][T16831] device bond_slave_1 entered promiscuous mode 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2963.665776][T16831] device bond0 left promiscuous mode [ 2963.679323][T16831] device bond_slave_0 left promiscuous mode [ 2963.685876][T16831] device bond_slave_1 left promiscuous mode 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x3c, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xe2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfd2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xd02}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2004000}, 0x44) sendmsg$nl_route(r1, 0x0, 0x4040840) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e640000000014000280050001000100000008000200", @ANYRES32=r3, @ANYBLOB="c2970375eca32a887a12ef73d2ffc79a7166df10d6e4f6ddce25d406680d9d559e1ed805095bddaecd9f65fa162afa0b31a29926add9cb0ed8a9e93c67ea35121db8a50965d73ec372ed29d2b4d5e1a3facd4d9de74af9818ca88a22ccaf0b48b577fae04f56f329cdc387d38556c52f8ae072"], 0x44}}, 0x0) [ 2963.901195][T16818] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2963.913821][T16838] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_OPERSTATE={0x5, 0x3}]}, 0x3c}}, 0x0) 00:09:25 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:25 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:25 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x8008743f, &(0x7f0000000080)={0x0, 0x0}) r1 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x20000041) [ 2964.243312][T16838] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2964.260149][T16862] (unnamed net_device) (uninitialized): (slave lo): Device is not bonding slave [ 2964.282422][T16862] (unnamed net_device) (uninitialized): option active_slave: invalid value (lo) 00:09:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f00000000c0)) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r7}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:25 executing program 2: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xef340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:25 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000640000", 0x1c) 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2964.485861][T16875] device vlan2 entered promiscuous mode [ 2964.532491][T16875] device bond0 entered promiscuous mode [ 2964.550613][T16875] device bond_slave_0 entered promiscuous mode 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2964.574147][T16875] device bond_slave_1 entered promiscuous mode [ 2964.612175][T16875] device bond0 left promiscuous mode [ 2964.640153][T16875] device bond_slave_0 left promiscuous mode [ 2964.647795][T16875] device bond_slave_1 left promiscuous mode 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:26 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000ac1414", 0x1c) 00:09:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x64, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x43fb, 0x4) r1 = socket(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76d5b724a6008000000000000000683440150024001b0000000000000000593ab700000000043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2965.302097][T16915] device vlan2 entered promiscuous mode [ 2965.315914][T16915] device bond0 entered promiscuous mode [ 2965.326127][T16915] device bond_slave_0 entered promiscuous mode [ 2965.333681][T16915] device bond_slave_1 entered promiscuous mode [ 2965.344600][T16915] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 2965.358027][T16915] device bond0 left promiscuous mode [ 2965.366298][T16915] device bond_slave_0 left promiscuous mode [ 2965.377410][T16915] device bond_slave_1 left promiscuous mode [ 2965.569663][T16916] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2965.577848][T16916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:26 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB='H\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r3, @ANYBLOB="0000000000000000040000000b000100666c6f77657200001800020014000e00fe880000000000000000000000000001"], 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 00:09:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r6, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/169, 0xa9}}, 0x10) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00q\x00E7\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0c0001800800010000eb0100"], 0x24}}, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000000)={r10}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000540)={r10, @in6={{0xa, 0x4e22, 0x2, @mcast1, 0x6}}}, &(0x7f0000000400)=0x84) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r7}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private0={0xfc, 0x0, [], 0x1}}]}]}]}, 0x3c}}, 0x0) 00:09:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2965.688928][ C0] net_ratelimit: 426 callbacks suppressed [ 2965.688936][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2965.739669][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 00:09:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3800}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2966.044570][T16932] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:27 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf1340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2966.152245][T16946] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 2966.172503][T16946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:27 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210400000000000000001c140000fe00000100000000088001"], 0x1}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000240)={@vsock={0x28, 0x0, 0x2710}, {&(0x7f0000000040)=""/108, 0x6c}, &(0x7f00000000c0), 0x41}, 0xa0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="c9ae", 0x2, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 2966.339356][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2966.376884][T16932] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:27 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) getpeername(r1, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000003c0)=0x80) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@getstats={0x0, 0x5e, 0x100, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x0, r9}, [""]}, 0x40}, 0x1, 0x0, 0x0, 0x4004050}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2966.394747][T16960] device vlan2 entered promiscuous mode [ 2966.416706][T16960] device bond0 entered promiscuous mode [ 2966.427018][T16960] device bond_slave_0 entered promiscuous mode [ 2966.462108][T16960] device bond_slave_1 entered promiscuous mode [ 2966.497861][T16960] device bond0 left promiscuous mode [ 2966.506375][T16960] device bond_slave_0 left promiscuous mode 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2966.522386][T16960] device bond_slave_1 left promiscuous mode 00:09:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, 0x0, 0x536ae464467e3929, 0x0, 0x0, {0x25, 0x0, 0x6800}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x8, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x2, 0x0, 0x1, 0x6, 0xfffffffc, 0x6, 0x0, 0xbd}, ["", ""]}, 0x38}}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r2, r4, 0xee01}, 0xc) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000057c0)={0x0, 0x0, 0x0}, &(0x7f0000005800)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005880)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000005740)=[{&(0x7f0000000240)={0x2bc, 0x2f, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@nested={0xa3, 0x72, 0x0, 0x1, [@generic="1bcf7a3be4b80b32bbfedce4b99d2f1047d4b23b7d93a5625f6cb296e154c98bd578f26cd7da89bdfe52b2b1eb3e8013feded59ca49ec5e5c81f1b98593a34bf31650186c745a3f3badb1dbe3ee6b36f0eb58d350e92f2cc1e76731eeae7dc9980f307aa8674fccd89334b8b0df725d8134e5c402ab63b74e873685fd68134fa350236756aa0e44830e7509f2549bf2d553d0cfbb4179c", @typed={0x8, 0x3d, 0x0, 0x0, @pid}]}, @generic="9b39b6e651e55e685d539d1b9c1b514742355eeece30ad7c674b4c4083972cb8bfbbefab52c2f0c961390b6c7197185b27d581709cbf5a39c98e378c27f53aacd9aced33196e9aee475a2e2aecd76e9e35a871cf1a4ae57b065cc0da7ccaa73bc79557eb4b625a5a078e49c7b33817570672ef599f22a8476be7a344ee809bafc326e9db17429301ed8ff2b2", @typed={0x8, 0x1b, 0x0, 0x0, @uid}, @nested={0x16b, 0x5c, 0x0, 0x1, [@generic="908e0a590e697c2729c33c1614c70648b1dd8967b9ae76f5fc5f6693d6db961a4c7388e527217e07b13859d241bdbba60ea4c16d4289048af3c48255e800609a42396bd9c6321fcff8299f20931c7cea7f38cb24572c2556b4d6f6c6c2bf694416b42fd7a076d4aed5956a2fbd60d12e9f9192262f4541ba5f3a38a4c5d49a5047a373416b60c53f745db87258", @generic="685d49141f736c83a93e7bc17de0b15053c710465ee05c4ddb87435ede08d8a089024a9a0c585f6f271be14ecce813333517eb8bd24c924387dfbaf13bfb8366eda0be84399f44875b18d36153dede389521544829", @generic="381b487f686629a1d68e72302a336bfd48c1dd4151f0e8dcfbc7597f7b05bad1cde4b6e809c318df4c77a2208f3aed68fd5f03306c5a34a7dca0bd3cda45f7ff302f22a06800043ed8a061f4e434fc8c65ae9ee19ae2d2410dd931aa874522d3d2caf810e112e1df1f5b4c104ecd", @generic="b5082785394c75ede3662e3b72106a312edb31a8376877"]}, @typed={0x8, 0x32, 0x0, 0x0, @str='\x10,%\x00'}]}, 0x2bc}, {&(0x7f0000000500)={0x235c, 0x3b, 0x20, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x90, 0x0, 0x0, @fd=r0}, @generic="4d3dd0876ac196e66b9a9d205ef7535691153460ff833bc8eba4ca9471d0e1e2a33e6de71d4aaf98fe31cb855ec26cc5d2e8dc7c1a132478ec7282e8c03d059847f65dac4a7f8b8e6c7a327dfd8a7a7dfab8dcdf46afd3", @typed={0x8, 0x15, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="07d48822eb311debca1d728d08067445f0e45b380a914fcc609079ab2da4b052c04440d67d45515095250294ee3cc6d80539dda8ee57284f3b61d4199f716d2ab45b79caf517ae53cc1dee8c82fd53764b1fdcb2680cc997c2b20d3f51b5ead6024951d5fa10fec8911aba0ffa1e0a32604be7414905d387a05ce2d376a2704dc3cc9b50fdb5320ced2d3af54833a1d466b385fdf7a8592b61b1d0a26ffa0fc8f2965ff4a941cbc17cfa30599960287991c9e26219578d8f35db08fb50cadf3b2c0f2a5ab1443f9a16975ff372b20de212513ef2e16baa409465bc2d6a66ec8932d162450e198ddca6d46584eb098ed806868bdd6c", @typed={0x4, 0x71}, @typed={0x8, 0x29, 0x0, 0x0, @ipv4=@loopback}, @nested={0x10fc, 0x10, 0x0, 0x1, [@generic="8e1a730ba742ac984cc9f7a24c03332282eb77acd3c5062e92e715eb70ea032058803e977abc3bde384424edf9ece90f4a44956632f377b183397722335e9d10b22564d4b1983cec382ab2117e2a564bcbe67e4e615fbe9daa2bfc8c5107f83bdde7900a151cd0cc98826ec4b296fdbd5d119a893b156b3b337366866b35170703a126956728d7355c0ae93919bd1732f84889bdb91800a3bed04e40be0a5330d6ce89f5711ea20171a8b7683231b3e6a45d3ee8641e11d8b88ff5145c7bf4693aebf2337516069a", @typed={0x14, 0x5c, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x12, 0x25, 0x0, 0x0, @str=')^:\'.]/!#-&:@\x00'}, @generic="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", @typed={0x8, 0x25, 0x0, 0x0, @fd}]}, @generic="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", @generic="f32a9e8be745794a83c8708dfb6cd34143f1764cfc3c115a8723e0c1206eabbf20f35cd35596ed2840b93f325be482b46ae38eb627f9a08e6fa7461b9a4374858b36c9c678d33afa7417d3ba2dfe604817d05f09d56a172fc8909be0de4ca0c7fb730d146b12c5530098dc9bee117ccb98bf95e03408bc5924af8ba89e42c45012e89d8aab2c9398bb2492f681b0977594d6e34aed33a53949e19c71af8f32d2b63836a57467fd7304a7219aa4edb2e914497499dc1236ae126ca6b18a23d3c45e4ec04b1b7ba8420aba964ffce685961732e99e5a3c178756d1cbff84e7b0347921baa138"]}, 0x235c}, {&(0x7f0000002880)={0x11e0, 0x21, 0x300, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x8, 0x91, 0x0, 0x0, @pid}, @nested={0x11a7, 0x2d, 0x0, 0x1, [@typed={0xc, 0x1b, 0x0, 0x0, @u64=0x7}, @generic="c9ccee52b659197bac96042c25b3263a55fbffb544b53e04c89120c00f114359c7b1f3138f80e262ecf924c37a4e9440a595ddae1ee8ee64b513f828f4af2bf3148d589058bfbb932ffd964dae0efab6b3c25e123339f4d27677508f7cf90e1b5b48a70821ffe3d4100cbe78e0c4c402828fde41a2920558aababbcc7691f14610f5d2495c", @generic="8996b1783252a531939e7e8b1e0e90ca0788a962d4dd74a909885174ebfcfe7c10f884e3c722a12a4a1d521329c5bc6aa911e90fa5ed8d2f5ea838c480e908526a6381e46087c7c09804", @generic="e51cfd4abc1c90d6209303c6cd466c2c0f419339ec1d6986506654803442f50ad008659f665ba2cdfbc8562521dae61b16a763d27bd69d1b4815f88323dfbad9fc8bd60b24b1f68051dc5dd58f95f655b9c726eabcbbbf4bf657bda44a7a64a08bedb5a330eb9b0f778ba59b2cb9be6f3f569923d60755fb4a46181c554798c2b4a43e479ae12504d5089b44236aa42ecd7c685802ad1a56f5cd4815cf5f7bc34ffe441c27dd1e82b62fdb324b20792281dfa51fa62ec8e1e2a3b69a108eaee44a461c1521564658", @generic="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"]}, @typed={0x8, 0x37, 0x0, 0x0, @uid}, @typed={0x8, 0x94, 0x0, 0x0, @ipv4=@loopback}, @typed={0x8, 0x33, 0x0, 0x0, @fd}, @typed={0x8, 0x6f, 0x0, 0x0, @fd=r0}]}, 0x11e0}, {&(0x7f0000003a80)={0x117c, 0x25, 0x400, 0x70bd2c, 0x25dfdbff, "", [@nested={0x10ed, 0x43, 0x0, 0x1, [@generic="5f4e4ea25ac2df5d2e2888ae970d56c8bfc4ae60395d5e22c85f1d93e0fc1b3ea8d7abd30cd8dd2bf8d9e8b87671ec619f4d6a93402428e908e8aafd0bf7c1eb28443f5cf3b34d0f096dad6485aed3ae171bd8df5bfe40ff9a25d0bdfbcc440804439a7fef92c818d9638cafbb7b1b263d2ec54cb1cbe1f7f75e2413e8fe5d65edeab5e56945150bd95c1696f3e152a67f970364bd725788579ad67058f699654c606c1f112ff5e08c13b87f01f68fc2c687d236ae7a0b9c84327377274c5740e39f806fd1bb25ba282d36d523bcd3837aef5251f91a6fe90b6ad101114af7d114", @typed={0x8, 0x7e, 0x0, 0x0, @u32=0x400}, @generic="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"]}, @typed={0x8, 0x49, 0x0, 0x0, @pid}, @typed={0x8, 0x4f, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x2}, @generic="e701e2318771439406b9fcafd368a7b387521abd683e56aafdd02f7a64bae1fe375c8ad555e6e6239994bb471ae7f326e35b58be065c8411dd43ce4ae43f4a31d1ca79992fc450be2d3b3e8fa3abb2f96d7fd41f5d5caacddd64055c2a482c407eeb"]}, 0x117c}, {&(0x7f0000004c00)={0x698, 0x17, 0x8, 0x70bd25, 0x25dfdbfb, "", [@typed={0x4, 0x55}, @nested={0x3a0, 0x6d, 0x0, 0x1, [@typed={0x14, 0x15, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x39}}, @typed={0x8, 0x7c, 0x0, 0x0, @u32=0x80000000}, @generic="c228b375b8a19c512f7dd065b0b073fb4eeefacc058bdb9d9f7b818b15748aeccb0f14a4d495eb6e053a317af4fd7318736b687e3bfc3b97f9e55db9202ed3f72172bee2fcf5568507b377bb7794357fbf6649705257592d1eae380e3f204ea2b90bf5ecf97500ae7a8f570fb3cc904deab44deaeb06afaaa9c31c77ae9c70a764ff80dccd2b26363187b6edfa285cb21b63d6a5a998b683f48e7d98b4027b4e0a1f2a1e20b6eea58c0f", @typed={0x4, 0x16}, @generic="a41213f48233c0558f93cb20d2156aeb7a51da1b7bae11e371f398eb1b2e13f46509fbfb0f3bd008929b35a203de785a5174caac5a172bd7b8d81ec60a", @generic="338afe2b0e95dd72e9575df9dbf23a72364d14af4387ac4d3a9724e7d149132e8278a7b13d807fd77e7b6ef6fa4b2a923ce729b4fd508e4af7bae836006c5ee642eee670b2980f0e96d8d5cde3b2a07927698d967a4a3388a59907ced5d3e1d763151f35707df5be0a795244f7083f3b765ab22d1fb719ba5329dee1b8d5b68c4667d4e6d49896256ab42542faa00fed5083ba970be760e5fe1372946fb8d02cafcef6af698fa2586b1f2aa815d0b2726bbaa5b41cfb4d9a1aa9878b479fd1015101ebeaadc588b392f91f", @typed={0x8, 0x6a, 0x0, 0x0, @ipv4=@multicast2}, @typed={0xa6, 0x7e, 0x0, 0x0, @binary="9848b6eca1871ca691599b023251c2b3c9d873402d33dbc77620eeb9ccf3d87cc134a8e71b063b7b861e0ee247a1e7d3a28f95a1605ebeffa5675ea9b6a85f85139c1797cb8d8d2c86b8fe05983c1d73b2506ed1882053425c1eda24365dd1fbfb365cffef4a5cf9ba075d5b48daad8b0f63579c7a6e047a3a219f554f24e992410c32ecd0dad416d834868455d2b1041a027509d05ba9f5d3d00d7dca274269c7d2"}, @generic="105bacd329a5bad33c641095d2bc639983fc1acfe2e571f6797a07dcb66a05c6ea4fe64d06ab6e353f20bce7fc868acd63b755f0011424c69aa015704e499438df9afb6b624f3cb539d499cb375d3cbd3c0def1a9f3da80117029ff129416b5794eaed", @generic="37a2783ef14fa2257caa23290d9d7e805ce2dee7f92a2fd3bfea0abd4cebd5d2baedad8ea020f94775999e5df64c875ab4db56d54feb31f329ded2bad24a2307827a00c2aefb08be257847b4cbf26ba2371883ed2177632456f5463a973575aa277d56126233b8c769220460c8298ed2d8d89aa541ca86d1cbfd562d5c118b9d3898d5c8b87f2768febce82148b507cd7a63419a814c874ccaa0ef1ffa9fb9b251f76717613e44be118f647cb99315188b2a85d5741e2b"]}, @typed={0x8, 0x6c, 0x0, 0x0, @uid}, @nested={0x251, 0x7f, 0x0, 0x1, [@typed={0x9, 0x4f, 0x0, 0x0, @str='syz1\x00'}, @generic="221bf068b0514395bd710154d1e9166a75b51093b1114ab6bad7db5960caa53d50e7638274ba2eb6dfc4b87354d6f58c74877b39b04ea6e2b033a16cdb94b5b5305035b6de858602665e406f33763d8008a4a80fd8ab8d6e6e20447c7c1af5aca0581b35036bae6fddcf068e77229f523dd561aa3980223ca20947678f5ad27ee8b30a009212ce10f89daf51047344a5302077bf8d89eaad166305638e1c20273885d3a2c06bb57093add6fb5d55b7492a502a72aa518e40162d4363b5ed8e539970f0", @generic="078d7eb8009b7f6bfbfa7fa318f7dc77a986dc0e30ef764070241e520285abcfbab11a1724550eff8127d4e775f211a8cb63ed05742904d8c5768d94c22f26a16dc1d0c3bb183e97a41a585adf2a0e5ce357e801fd90e49b7c490c07e0ba8389548bb5e3c3bbc6b5269f6061a36c0214d425d22f6a1c5656dbf09545a1d9949094083c2c35d2dd", @typed={0x8, 0x90, 0x0, 0x0, @fd}, @typed={0x8, 0x89, 0x0, 0x0, @fd}, @typed={0x8, 0x79, 0x0, 0x0, @u32=0xfffffffa}, @generic="d66311f3e8d387486dd7d6e8c2bc33a4b679d56cec1073da38f7a5066b8c8914ad7ccec9b7eb6c6c4d3720db43600c896a5bb84d5feb94f7242a487bf12f542169e64b06ceda953504ad0ea373ed94719bbc3140622ee71f2d225dc88c6f61bec61c38e9438de274fb8093b0d209246cdf2745f6250dbc1c1527524bbc4db25256457c5d57c8702ff87e8702f95e08a61d97a0a8f59d133795b96b97f6248f41dd446a1982ac502af25595175799b9f63e20e3310a5bb543d29e76eda45fa38963bc4b9a3832c079441a0beb73d88ea0169e132302dceeaddd43962fcf4684"]}, @generic="0507763c30e81cc0084767a2b440de08096bb690a47c4c3b5bc4d6d73e47d60bf6d9246d170769c636a47f20381825ea7817bf405739fd39b12fe6a243644e250c81461ec6782101ff485108aac61749ede3daad5a168f8d05f917b77b55a6ce62080592d7c28d25d458b64a763dbd9ce737024233f17426eda896e80ea614a4932437bbe7bc1a"]}, 0x698}, {&(0x7f00000053c0)={0x288, 0x30, 0x20, 0x70bd2d, 0x25dfdbff, "", [@typed={0x4, 0x2d}, @typed={0x8, 0x5e, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x8, 0x71, 0x0, 0x0, @ipv4=@broadcast}, @nested={0x263, 0x90, 0x0, 0x1, [@generic="814d1cd850244904e064ca6d3f7ee0250bb66925869137b3b3104c1fbd73d0178626d6762ab69b53ed7c7842a0756f358df7166e41c09a895798273a8bb9db548965aafa05641fd0", @typed={0x4, 0x26}, @typed={0x8, 0x86, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x8d, 0x0, 0x0, @uid}, @generic="ff53a9d739e79b5d4eebf6d1e679aa0214dcd855befd3b9e4729180519cd6958e03d140c54d50215e2b119653365e9eab1d450df7b2f0a9d576ef40d8e3e5d69d2949e932238ffdec3039801babf964713b141666c6dcabd7fa6eeed6783d7de08913087d06255aa8e877aada9a572cd5b9db19133504f99cd6cd86e35c79a961997bdf806e49625e5d25d5f3c1d390b62c90fe2018ba83391a42523996cf9b9b788daf95a9ba5f0bd5e5df331cffe73e5fad26d89ce61f1a773", @typed={0x8, 0x16, 0x0, 0x0, @fd=r0}, @generic="66267af787059cbc8044f1b42ea627de5808633832284796fd09b68589e202dc839c8eb23d53888178464e49ab564a87e5ad3b46cb55f9c0d364d8bff8b5779c3edc8ec2ea78f3b61521fe6041e7eb336202978321aeb570a8fc6140bb9d69bd15cdebbe17ce1bc8b64e95b78e16c9b91b51377304c125b3280ba0785f18148cea761a00a218356b2ee02ea62a2ad2be4cb2f6692f0b0199486745ed7b623965ed5aca48685eca56f06afbb766807bba91a82a81cc1e2fa644077a5b0e5664f8dc7fd85aeb33d04ea71bb0381ca4ec63e0957ac2b773d4a6d59428d86f7b3461850615a607438790d64558872fbeea3ca5b74f5bd14c", @generic="b0b304a14868dcb4e0a2e449a9d65aed5fdb1b9f54f1c0394fc52ae54b51e16581ebeaa0d3cbad6bfb0bacaff56a30a776a78e6b69008b2e2288c52e178eb2", @typed={0xc, 0x47, 0x0, 0x0, @u64=0x401}]}]}, 0x288}, {&(0x7f0000005680)={0x14, 0x3a, 0x0, 0x70bd28, 0x25dfdbfc, "", [@typed={0x4, 0x95}, @generic]}, 0x14}, {&(0x7f00000056c0)={0x7c, 0x27, 0x100, 0x70bd26, 0x25dfdbfb, "", [@generic="43e8d9ee0764818cc28c526a072833a0489bde624440fecd4931941fc40e136c7ef38086bf3684f865c458066abe35c3bec86ee2c954af17e0a885659a541109cb25160c4201f295ee22224eec89ed8510d5b817a7a7ad32be4664ea4e5cc2282deaeabc7301039e6eb441"]}, 0x7c}], 0x8, &(0x7f0000005840)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4, r6}}}], 0x20, 0x401}, 0x8010) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x30, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0x30}}, 0x0) [ 2966.618864][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000000100008000"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@local, 0x0, r3}) 00:09:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2966.896584][T16962] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 2967.017966][T16960] device vlan2 entered promiscuous mode [ 2967.031584][T16960] device bond0 entered promiscuous mode [ 2967.037340][T16960] device bond_slave_0 entered promiscuous mode [ 2967.044965][T16960] device bond_slave_1 entered promiscuous mode [ 2967.066563][T16960] device bond0 left promiscuous mode [ 2967.073514][T16960] device bond_slave_0 left promiscuous mode [ 2967.080150][T16960] device bond_slave_1 left promiscuous mode 00:09:28 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf2340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00004cd4000000", @ANYRES32=r3, @ANYBLOB="00000000000000001c0012000b000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}, @IFLA_HSR_SLAVE2={0x8, 0x2, r6}]}}}, @IFLA_LINKMODE={0x5, 0x11, 0xfa}]}, 0x48}}, 0x0) r7 = socket(0x1e, 0x805, 0x7) bind$inet(r7, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r7, 0x1, 0x3c, &(0x7f0000000000)=0x2c81, 0x4) sendmsg$inet_sctp(r7, &(0x7f0000000380)={&(0x7f0000000040)=@in={0x2, 0x0, @remote}, 0x10, 0x0}, 0x4000000) accept$inet(r7, &(0x7f0000000280), &(0x7f0000000300)=0x10) sendmsg$nl_route_sched(r7, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getqdisc={0x40, 0x26, 0x100, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x2, 0x5}, {0xc, 0x4}, {0xffff, 0xfff4}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x82}, 0x1) 00:09:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x88, 0x17, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, 0x88}}, 0x20000000) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062726964676500000400028008000a00485fa05f9167b73ff99fd294a9577d11f22390f0e7c0fa3e5ef586", @ANYRES32=r5, @ANYBLOB], 0x3c}}, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x20, 0x11, 0x425, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3a03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2967.794709][T17018] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2967.845015][T17021] device vlan2 entered promiscuous mode [ 2967.855929][T17021] device bond0 entered promiscuous mode [ 2967.862517][T17021] device bond_slave_0 entered promiscuous mode [ 2967.869673][T17021] device bond_slave_1 entered promiscuous mode [ 2967.880530][T17021] device bond0 left promiscuous mode [ 2967.885979][T17021] device bond_slave_0 left promiscuous mode [ 2967.893377][T17021] device bond_slave_1 left promiscuous mode [ 2968.007554][T17024] device bridge660 entered promiscuous mode [ 2968.015984][T17024] device veth139 entered promiscuous mode [ 2968.024613][T17024] hsr3: Slave A (bridge660) is not up; please bring it up to get a fully working HSR network [ 2968.035526][T17024] hsr3: Slave B (veth139) is not up; please bring it up to get a fully working HSR network [ 2968.142924][T17028] bond36 (unregistering): Released all slaves [ 2968.296675][T17018] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2968.341160][T17021] device vlan2 entered promiscuous mode [ 2968.361339][T17021] device bond0 entered promiscuous mode [ 2968.367131][T17021] device bond_slave_0 entered promiscuous mode [ 2968.382824][T17021] device bond_slave_1 entered promiscuous mode [ 2968.395997][T17021] device bond0 left promiscuous mode [ 2968.401730][T17021] device bond_slave_0 left promiscuous mode [ 2968.407797][T17021] device bond_slave_1 left promiscuous mode 00:09:29 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf3340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0424fc60100000000a000000053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @remote}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000500)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2400a0}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)=@getpolicy={0x110, 0x15, 0x4, 0x70bd2a, 0x25dfdbfd, {{@in=@broadcast, @in=@local, 0x4e21, 0x1, 0x4e24, 0x6, 0x2, 0x20, 0x20, 0x73}, 0x6e6bb9}, [@tfcpad={0x8, 0x16, 0x7f}, @lastused={0xc}, @policy={0xac, 0x7, {{@in=@empty, @in=@empty, 0x4e20, 0x6, 0x4e21, 0x6, 0x2, 0x20, 0x0, 0x73, 0x0, r5}, {0xff, 0x7, 0x8000, 0x400, 0x0, 0x10000000000000, 0x0, 0x7f}, {0x3, 0x10001, 0x6, 0x1bf0441}, 0xfffffffd, 0x0, 0x0, 0x0, 0x2, 0x1}}]}, 0x110}, 0x1, 0x0, 0x0, 0x40000}, 0x1004c000) r6 = socket(0x10, 0x80002, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r9}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_inet_SIOCDELRT(r6, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @empty}, {0x2, 0x4e21, @broadcast}, 0x214, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)='veth1_to_bond\x00', 0x2, 0x4, 0x3800}) 00:09:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c001e001000010800000000000000000000005500", @ANYRES32=r3, @ANYBLOB="00000000d54b03bf0700fe8800000000f47ddcf9fff405b237d45fe0bc7903fc5b300000d3a618ff00"/51], 0x3c}}, 0x0) 00:09:29 executing program 2: unshare(0x6c060000) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x1a4, 0x0, 0x2, 0x3, 0x0, 0x0, {0xd, 0x0, 0xa}, [@CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x800}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x100}, @CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_MASTER={0x94, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_MASK={0x74, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz1\x00'}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4044) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 2968.663657][T17145] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 00:09:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3b03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2968.731687][T17148] IPVS: ftp: loaded support on port[0] = 21 00:09:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2969.132560][T17145] __nla_validate_parse: 7 callbacks suppressed [ 2969.132587][T17145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0xf, 0x5, 0xfffa) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xd}}]}, 0x24}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@ipv6_getmulticast={0x14, 0x3a, 0x300, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x1) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) setsockopt$rose(r2, 0x104, 0x5, &(0x7f00000000c0)=0x8, 0x4) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r8, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r10, @ANYBLOB="0800000f4745729307faf6d72c0fe4f0b71a644534de286818e0119c35983bfb86b1f7373bf847c3c1e0473f1e07caf1414cf686be00adf96de12336c2230a8e344feaeaa1f32cdbe5c3fbbb35d7394fdc1df047e1ff403e06b34b6557c217c965919a3453aaa09454706a7a7b09b39f4a4ce9e65d00"/127], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 2969.172904][T17149] device vlan2 entered promiscuous mode [ 2969.227714][T17149] device bond0 entered promiscuous mode [ 2969.253838][T17149] device bond_slave_0 entered promiscuous mode [ 2969.283312][T17149] device bond_slave_1 entered promiscuous mode [ 2969.335344][T17149] device bond0 left promiscuous mode [ 2969.356588][T17149] device bond_slave_0 left promiscuous mode [ 2969.376260][T17149] device bond_slave_1 left promiscuous mode [ 2969.520462][T17161] IPVS: ftp: loaded support on port[0] = 21 [ 2969.565713][T17153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2969.587816][T17159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:09:30 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf4340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2969.615339][T17161] lo speed is unknown, defaulting to 1000 [ 2969.626342][T17176] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3c03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:30 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f049e46ac000000", @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080), 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="4000000010001f789f2bbe937ea5920000000000fc7ba6e5fcc3b4c17fa0b9335ff46db247e5eca4a8259f60fae56b14c2599ccf29ff0953a61d77e08f1086e678596cff8c97ebb8059d975cb5fbf4000000802a7ac85d6302233c89b8ef402ee9255975ff878a1ff718cd34eb049e72ba4a21b3355b3932aa35f4020dc10c34c3f1633f32b127e5b9b70e220d6052f91215", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800b921775d3d65900566c00000800028004e8775400130008", @ANYRES32=r3, @ANYRESHEX], 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000ff000104007bf92b1f4882cdc9000000", @ANYRES32, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x81, 0x7b, 0x8000, 0x1, @local, @private1={0xfc, 0x1, [], 0x1}, 0x1, 0x7800, 0xff}}) [ 2969.825284][T17164] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2969.836455][T17191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2969.904712][T17161] virt_wifi0 speed is unknown, defaulting to 1000 [ 2969.911525][T17148] lo speed is unknown, defaulting to 1000 [ 2969.931002][T17209] IPVS: ftp: loaded support on port[0] = 21 00:09:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2969.956306][T17201] device vlan2 entered promiscuous mode [ 2969.999398][T17201] device bond0 entered promiscuous mode [ 2970.005728][T17201] device bond_slave_0 entered promiscuous mode [ 2970.014318][T17201] device bond_slave_1 entered promiscuous mode [ 2970.028068][T17201] device bond0 left promiscuous mode [ 2970.036865][T17201] device bond_slave_0 left promiscuous mode [ 2970.044623][T17201] device bond_slave_1 left promiscuous mode [ 2970.254553][T17176] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2970.361769][T17212] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2970.465654][T17212] 8021q: adding VLAN 0 to HW filter on device bond36 [ 2970.484915][T17214] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2970.510753][T17216] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2970.532503][T17148] virt_wifi0 speed is unknown, defaulting to 1000 [ 2970.539973][T17209] lo speed is unknown, defaulting to 1000 [ 2970.576926][T17201] device vlan2 entered promiscuous mode [ 2970.590055][T17201] team0: Device vlan2 is already an upper device of the team interface [ 2970.737243][T17212] IPVS: ftp: loaded support on port[0] = 21 [ 2970.782943][T17212] lo speed is unknown, defaulting to 1000 [ 2970.796462][ T5947] tipc: TX() has been purged, node left! [ 2970.804411][T17209] virt_wifi0 speed is unknown, defaulting to 1000 [ 2970.955987][T17212] virt_wifi0 speed is unknown, defaulting to 1000 00:09:35 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) connect$netrom(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000300)=@ipx={0x4, 0x2, 0x0, "7d0b028afb60", 0x8}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000004c0)="0b5f79316e9938d403cf5263553fa4a4a53b199025753f1fea0c271cea0ad43ffb095abac3e62b59d551778b95a3b24c6f8fe36185de15dbf8306666f6677e9a782970120b0bdf799a84eb93c3a42788cc8a3bc71efaf7fa5163a39e37409c7403a73784903c11d9cfdeb7baeafe5364ba74d6e4a1429edf26d61168cedc32ea03f1d42d6b21b8ce492667f136fdde936b581637f6191801a75587dae76469a306468d39aabb748b16ee6514f6ec5668617a990ffa4d4aa525f397037d249bca29645201b5d6d752a4728fe7df48dc9964e3c0c72452d59fd6a8896429e87f60134dd89cbd88a0138289495d884258ac8be7e2e94e", 0xf5}], 0x1, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x4001) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 00:09:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:35 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r10 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r11, @ANYBLOB='\b\x00j\x00\x00\x00\x00\x00\b\x00i'], 0x5}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r9, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x200}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r8}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0x2c}}, 0x40814) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r9, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008810}, 0x24008800) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:35 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf5340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r3, &(0x7f00000000c0)="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", 0x27b, 0x20000000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x11, 0x10012, r2, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) 00:09:35 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000002) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 00:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3d03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2974.927820][T17377] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2975.240762][T17366] device vlan2 entered promiscuous mode [ 2975.279150][T17366] device bond0 entered promiscuous mode [ 2975.284798][T17366] device bond_slave_0 entered promiscuous mode [ 2975.314851][T17366] device bond_slave_1 entered promiscuous mode [ 2975.346192][T17366] device bond0 left promiscuous mode [ 2975.364626][T17366] device bond_slave_0 left promiscuous mode [ 2975.382408][T17366] device bond_slave_1 left promiscuous mode [ 2975.643178][T17370] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="bf16000000210000b70700000100f0ff4070000000000000400000000000e1ff95000000000000002ba7e1d30cb599e83f24a3aa6bb3019c13bd23212fb56f040026fbfefc41056bd8174b7960317142fa9ea43f31bac01c4e345c652fbc1626cca2a2ad75806150ae0209e62f51ee00baff7f0000000000000000000000c6939fc404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965c39e9ef8f6e3968f200e011ea665c45a3449abe802f5ab3e89cf6c06000040b8580218ce740068720000074e468eea3fcfcf49822775985bf313405b433a8acd715f5888b2007f00000000000000000100000000000000010000000000000053350000000034a70c2ab40c7cf5691db43a5c000000000000000031000000000000000000e75a89faff01210cce39bf405b1e846c12423a164a33e680846f26ad7add65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a805608df4d431623c850af895abba14f6fbd7fb5e3a431ab9142f3a06d55740a43088696daaed74b9c5c29647d2f950a959cf9938d6df8600a62e96b7cb8e52cbdc2ba9d580609e31c3fa90e7e57a79d6fce42449b20af6c7784a1975fa657de38a3a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6edc71df48dca02113a38300cabf2b5751ffc1669557b3819d8c396d2c2361629d1822f72204000000000000000600000f7889b8c7044f563a1f68d4efe895fdbc463f747c08f4010586903500000000000000000000000000000000000000000000000000000000bc6fa701329fabe4418266d25d4e038613b61e17e0d7d5a5203397f6c89a2457fe9144261d73065e164b8ca7887a0ef278209e3d5e75b6a2a218a6189b0cda953f96f96bec877343f3fcc90c08092e7414ee6161b2ecbc0cae3c0636f4a706d52afafa7fe2be7d2cbe2cf01851b21d3e49885843c4290404b4a1fff519d590ec8e9b66c87fe224b39eb04a9c4322cdb4077c84ff77d5e8f8366fa3822acb59990f0ffbdd6c274deb9f8a0767e47e898000a0bcd1749f538e5d881f4495758f30afeb05ed4875820473767174789f89c0e4ad82b7b3f5bbd2769c4c961d891cc4b2f53aa2bae72c0c8939fe6ba8d6a967a443bfc3e99fa51544553fed65bda7ab18050a19537a8ef55d916758d7c40d73368f10ccc9002e1f88adf407e6ad85d3ce519e24eb7ffd66a64435f242439c5726711196ef3beaf8dc439d4d1f"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) socket$phonet_pipe(0x23, 0x5, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 00:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000002) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 00:09:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000800)={0xffffffffffffffff}) bind$l2tp6(r5, &(0x7f0000000840)={0xa, 0x0, 0x6, @private0={0xfc, 0x0, [], 0x1}, 0x3ff, 0x2}, 0x20) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r8}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x24, 0x10, 0x801, 0x0, 0x1, {0x0, 0x0, 0x0, r8}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) r9 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@qipcrtr, &(0x7f00000000c0)=0x80, 0x800) recvmsg$can_bcm(r9, &(0x7f00000007c0)={&(0x7f0000000300)=@alg, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/122, 0x7a}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000600)=""/242, 0xf2}], 0x3, &(0x7f0000000700)=""/190, 0xbe}, 0x20) 00:09:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3e03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:36 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:36 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf6340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:36 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r3, &(0x7f0000000000)="7f3ca1fd5866a3e108d97a95ede7e47c29955f5b69b65ea70ecef70906fc877afd5e360545f2c16841cc75fc44bb", 0x2e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x1000, 0xfbed, 0x2, 0x418, 0xffffffffffffffff, 0x1000, [], 0x0, r2, 0x2, 0x3, 0x4}, 0x40) ioctl$FICLONE(r6, 0x40049409, r0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x800}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x4, 0x0, 0xfffffffe) 00:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:37 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2976.083734][ T27] audit: type=1804 audit(1597018177.103:2574): pid=17416 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3928/cgroup.controllers" dev="sda1" ino=15809 res=1 00:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2976.195436][ T27] audit: type=1804 audit(1597018177.213:2575): pid=17422 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3928/memory.events" dev="sda1" ino=16129 res=1 00:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2976.285072][ T27] audit: type=1804 audit(1597018177.223:2576): pid=17422 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3928/cgroup.controllers" dev="sda1" ino=15809 res=1 00:09:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x3f03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:37 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz1\x00'}, 0x0) socket$inet(0x2, 0x3, 0x32) sendfile(r2, r1, 0x0, 0x100000001) getsockname$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, &(0x7f0000000100)=0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000880)={&(0x7f0000001000)=""/102400, 0x120933, 0x1000}, 0x50) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) 00:09:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000002) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) [ 2976.723983][T17415] device vlan2 entered promiscuous mode [ 2976.740067][T17415] device bond0 entered promiscuous mode [ 2976.745922][T17415] device bond_slave_0 entered promiscuous mode [ 2976.754205][T17415] device bond_slave_1 entered promiscuous mode [ 2976.767687][T17415] device bond0 left promiscuous mode [ 2976.775642][T17415] device bond_slave_0 left promiscuous mode [ 2976.784990][T17415] device bond_slave_1 left promiscuous mode 00:09:38 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf7340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4000}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', r4, 0x2f, 0x3f, 0x3, 0x3, 0x44, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x7, 0x7, 0x2}}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = getpid() sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c0000001000050726bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a000100767863616e000000180002801400010000000000", @ANYRES32, @ANYBLOB="00800600002000000a000500040000000000000008001300", @ANYRES32=r6], 0x5c}}, 0x0) 00:09:38 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00q\x00E7\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0c000180080090ac5b695e70"], 0x24}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r10}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000025}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)={0x15c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x34, 0x4, [{0x9, 0x9, 0x4, 0x1}, {0x8000, 0x7, 0x4, 0x6}, {0x1, 0x2e, 0x8, 0x3}, {0x6, 0x0, 0xfe, 0x4}, {0x24cd, 0x3, 0x4, 0x7}, {0x7, 0x6, 0x18, 0xffff}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r4}}}]}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x80}, 0x9) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x4003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c001a80000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) 00:09:38 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2977.218685][T17460] IPVS: ftp: loaded support on port[0] = 21 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2977.264777][T17464] __nla_validate_parse: 3 callbacks suppressed [ 2977.264787][T17464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000002) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) [ 2977.380740][T17463] device vlan2 entered promiscuous mode 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2977.430987][T17463] device bond0 entered promiscuous mode [ 2977.458786][T17463] device bond_slave_0 entered promiscuous mode [ 2977.490484][T17463] device bond_slave_1 entered promiscuous mode [ 2977.531651][T17463] device bond0 left promiscuous mode [ 2977.539830][T17463] device bond_slave_0 left promiscuous mode [ 2977.559951][T17463] device bond_slave_1 left promiscuous mode 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2977.976992][T17460] lo speed is unknown, defaulting to 1000 [ 2978.036854][T17499] IPVS: ftp: loaded support on port[0] = 21 00:09:39 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf8340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:39 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2978.250297][T17462] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2978.273445][T17492] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2978.281811][T17460] virt_wifi0 speed is unknown, defaulting to 1000 [ 2978.288024][T17466] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2978.490996][T17515] device vlan2 entered promiscuous mode [ 2978.522093][T17515] device bond0 entered promiscuous mode [ 2978.541283][T17515] device bond_slave_0 entered promiscuous mode [ 2978.562227][T17515] device bond_slave_1 entered promiscuous mode [ 2978.584989][T17515] device bond0 left promiscuous mode [ 2978.607969][T17515] device bond_slave_0 left promiscuous mode [ 2978.614034][T17515] device bond_slave_1 left promiscuous mode [ 2978.963784][ T5947] tipc: TX() has been purged, node left! 00:09:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x100000002) 00:09:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000000000003904000000000900000000000000", @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r6, @ANYBLOB="08000300ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:40 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:40 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf9340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x800000000000c) socket$netlink(0x10, 0x3, 0x9) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="87fe202e2f66696c659385943d30205e2d20656d6f72792e6c616e317b206d656d6b72792e657665007473000ae0a44301e35f6ea70565eb521d878e8331cc494cda1a5bcdcd7a367fc22372c64b9cd509bf542d6943a89ac7f0a5cd01ffc671f4afd52f9209dfb706a9a9ef38a967b548000e6aa52f4a78b5691103527b598a39c56ad5eeeacb5d65f04751f1caca27b2b1f3608c09e7c2d66a18c484aee2d1b950a92e2214ac481a01233932e93608ed16149749f7a53c09db4ca9722d602042e641c1d511a45053d271dfbf354bccf7eb03dea7f946c51f17574769a3caa386834f45776304270000000000002c4601c79e1e72bbabf385b3c47cfb0af70000005104102d22e2a4000000000000000000006c3db85b12618c42624a044e5132da3377e49c53bee9bdead00ea8681361c18a124419bb93e420e42ed65f78a573a1f06887e0afbdf007f4deea9c76473499025de3b7ee5a0c512559d09758538f2c93d9850ceb9387bc684cdb5dbd8ba37e6c976cac1c06b81aad7ab1324a2a007227efcce1baa66c8938fd9a00000000000000000000000000000e8a35c37425e2707f443894fd176c1da9b3b8511f3d21918755817c7d96ea1229ddeb3c391c6d1787aeac7b2d4c33dc75be0bb75a9a4909bc2a41d00ddeec215452861be5e80f57195f2731ad69f412591439298dd85430dca3831259c964f88b978a9757f208da2fd26c28141f31a7a2d51f171fff80af15de65f0e8e0611d26d6724e149fcb15f317a855d936e8b300000000aec90e95f84cc9fe87a4f4540ae6e9e68f1c0036b61bbc285f1b535da1ddd0d72fc7d92c1f0b69f6ef157096f2599b348cd61837f6e17819fd15ff049eb5ff95543c7cec4ef36b63c4b4c52f1dc757788fcdcfb141eb67c37857aedf06582aab98eff226"], 0x111) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) close(r2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x80000003, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x0, 0xfffffffd, 0x2, 0x8, 0x9}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r3, &(0x7f00000001c0)=[{{&(0x7f0000000100)=@ethernet={0x306, @dev={[], 0x39}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000240)="d712a1feb475b7360f281a5fbca411876ebec552cfb560567c5da5854df0cbd94466ec589b50934475bd07470629f5faf999e7505d0c9c6c2125abc43cdc4ef817a5dfb597ba25902fc51319e5d1146b02b878d66c40687c1f154530d98bd5982b8a961e617d3008770f52d28d8a0a2d801724296bff823bf70f211fb9577aa231408bd85fa9eb06ed06f53bbefd2600189b9623a6a472340cb1bc706f684a1f88a2dee2348f9fb288ae0c47088a9a62f7b5ac", 0xb3}, {&(0x7f0000000300)="aa9e866578712d76f997c8cef2862cce0a5215cdfbae979bb6a9be4b4277654f060600c2b661818530c6dc8d58220c99ea948c89aafce3420b49266d9a6d08509c703839ec23d26ecca88820da9708a11e233c4306d6e080380569bebf3985c7ab4fc3a181e0bc1bd206bb0109b21ac195739e008437bc77b5f1c89fee3be02839ed585f9507", 0x86}, {&(0x7f0000000180)="c671b6", 0x3}, {&(0x7f0000002c00)="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", 0x179}, {&(0x7f0000000740)="d4fd2c9ee3a1574f5c8156886e7cceb54800c4df6d0ac11873434fa8de83cbf48473db6cdbdecef3332712ed54dbd67da251045b2972d80dfcdbbb7f3b6b61552bf1b60897122026498ba96ef5cf928a603a63aeb920eedad896e8912d8ead1e0acef8a8c810c9a0cfc51104e567db44ce7dd2803ed853a3eb1cf8a09f310f6a0122439984f4c258235bd863b4224056685f00c42733db9b1c735f5bb98153b20bb6bafef9c635106125293f7d6fe167190424796791ba4c5d16cbaca8a0378506f6b7fe63dff71d28973267f4eaf3abca", 0xd1}, {&(0x7f0000000840)="2a35b4e10223cd748a0e809c0434259c68d5ed9561e8b8d229914b424dc687cfaa59876fd19dcbc01c26b5fc6d66775db4e18fe976f7ea081d9bcd8c02158805fd8d8d5d3d637791476ba3cecde397e785127cf52525ffc01846ceeb7c2652bda06b7d817be2345af6df75397558fe7d65b01d779462532dacb164", 0x7b}, {0xfffffffffffffffe}], 0x7, &(0x7f0000005040)=ANY=[@ANYBLOB="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"], 0x2298}}], 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) 00:09:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:40 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2979.741746][T17549] device vlan2 entered promiscuous mode [ 2979.785410][T17549] device bond0 entered promiscuous mode [ 2979.806455][T17549] device bond_slave_0 entered promiscuous mode [ 2979.827270][T17549] device bond_slave_1 entered promiscuous mode 00:09:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2979.855454][T17549] device bond0 left promiscuous mode [ 2979.870835][T17549] device bond_slave_0 left promiscuous mode [ 2979.886809][T17549] device bond_slave_1 left promiscuous mode 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000240001000000000000000000000000000600040000c3004f5804cc694f8b60116860685cc3597c1910c2dfc235b35c5713e712db1541dca933d85a9f76b6b79d7b7b6c3f47d0fbb2f677ee6a95541a45cb0d9bcf87a07ab536d9ee86bc408b20ddb40c5a7ef24740bf4a2dd880af2ea30db2020a5df6300ce88b72d2a53604ca1c3282449958fc165fa9f62e9be755833d25ae5a9d50"], 0x1c}}, 0x0) 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) 00:09:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r4, @ANYBLOB="03400000000000002000128008000100736974001400028008000100", @ANYRES32=r6, @ANYBLOB="0800030075e07e1cd885ac1414aa"], 0x40}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) 00:09:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:41 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfa340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x11) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000080)=0x63a5b074, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x563, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4400}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:42 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4401}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) [ 2981.137551][T17594] device vlan2 entered promiscuous mode [ 2981.156865][T17594] device bond0 entered promiscuous mode [ 2981.173459][T17594] device bond_slave_0 entered promiscuous mode [ 2981.186049][T17594] device bond_slave_1 entered promiscuous mode [ 2981.207487][T17594] device bond0 left promiscuous mode [ 2981.226325][T17594] device bond_slave_0 left promiscuous mode 00:09:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2981.252630][T17594] device bond_slave_1 left promiscuous mode 00:09:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) 00:09:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:42 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfb340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:42 executing program 2: sendmmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffd40, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0xff0f) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0xfffffffffffffdb5, 0x0}, 0xc0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 00:09:42 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) 00:09:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) 00:09:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2981.948190][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.015818][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2982.061561][T17637] device vlan2 entered promiscuous mode [ 2982.069773][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.111097][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.124053][T17637] device bond0 entered promiscuous mode [ 2982.155951][T17637] device bond_slave_0 entered promiscuous mode [ 2982.167874][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.194555][T17637] device bond_slave_1 entered promiscuous mode 00:09:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) [ 2982.215989][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2982.270204][T17637] device bond0 left promiscuous mode [ 2982.273907][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.294375][T17637] device bond_slave_0 left promiscuous mode [ 2982.307250][T17637] device bond_slave_1 left promiscuous mode [ 2982.332290][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.359372][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2982.398664][T17635] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:43 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$inet(0x10, 0x2, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000000a6e554a5427de79636d6b46b91a74aa06c", @ANYRES16=0x0, @ANYBLOB="00000000000000000000010000001400018006000100020000000800050000000000"], 0x28}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000a00000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004"], 0x1}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe0, 0x0) 00:09:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2982.869346][T17657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:44 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfc340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2982.930150][T17663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x80002, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r9 = accept4$phonet_pipe(r5, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r9, 0xf504, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x48}}, 0x0) 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) 00:09:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2983.054170][T17678] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2983.163535][T17683] device vlan2 entered promiscuous mode [ 2983.196223][T17683] device bond0 entered promiscuous mode [ 2983.228819][T17683] device bond_slave_0 entered promiscuous mode [ 2983.252206][T17683] device bond_slave_1 entered promiscuous mode 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2983.286449][T17683] device bond0 left promiscuous mode [ 2983.303593][T17683] device bond_slave_0 left promiscuous mode [ 2983.326004][T17683] device bond_slave_1 left promiscuous mode 00:09:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffde9}, 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmmsg(r5, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x35}, 0x401}, {{&(0x7f0000000280)=@nfc, 0x0, &(0x7f00000003c0)=[{&(0x7f00000007c0)=""/4096}, {&(0x7f00000017c0)=""/4096}, {&(0x7f0000000300)=""/15}, {&(0x7f0000000380)=""/1}], 0x0, &(0x7f0000000400)=""/38}, 0x18}, {{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0, &(0x7f0000000700)=[{&(0x7f0000000500)=""/203}, {&(0x7f0000000600)=""/204}], 0x0, &(0x7f00000027c0)=""/196}, 0x8}, {{&(0x7f00000028c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002940)=""/163}, {&(0x7f0000002a00)=""/68}, {&(0x7f0000002a80)=""/100}, {&(0x7f0000002b00)=""/102}], 0x0, &(0x7f0000002bc0)=""/59}, 0x80}], 0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYRESOCT], 0x18}}, 0x0) 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2983.915208][T17688] batman_adv: Cannot find parent device [ 2983.960891][T17688] batman_adv: batadv0: Adding interface: ip6gretap1 [ 2983.988557][T17688] batman_adv: batadv0: The MTU of interface ip6gretap1 is too small (1434) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2984.047793][T17688] batman_adv: batadv0: Not using interface ip6gretap1 (retrying later): interface not active [ 2984.083764][T17701] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2984.117125][T17678] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:45 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfd340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 2984.157766][T17699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000210f4633677f9426d0001050000000000", @ANYRES32=0x0, @ANYBLOB="43c7000000000000140012800c0001006d616376746170"], 0x48}}, 0x0) 00:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) accept$packet(r4, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) 00:09:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:45 executing program 4: unshare(0x60060280) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000180)={'\x00', @ifru_ivalue=0x6}) close(r0) 00:09:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2984.372884][T17733] IPVS: ftp: loaded support on port[0] = 21 [ 2984.384415][T17726] device vlan2 entered promiscuous mode 00:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) [ 2984.448604][T17726] device bond0 entered promiscuous mode [ 2984.475757][T17726] device bond_slave_0 entered promiscuous mode [ 2984.507766][T17726] device bond_slave_1 entered promiscuous mode [ 2984.528610][T17726] device bond0 left promiscuous mode [ 2984.552716][T17726] device bond_slave_0 left promiscuous mode [ 2984.588364][T17726] device bond_slave_1 left promiscuous mode 00:09:45 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, @tipc=@id, @can, @vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) r0 = socket(0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000100)=0x1f, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x7, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000280)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd"], 0x6) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r3, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8004}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x2, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x8090) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYRESOCT=r0, @ANYRES16=r3, @ANYRES64=r2], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x24048841) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8100000001) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000880)={&(0x7f0000001000)=""/102400, 0x120933}, 0x20) 00:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4800}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2985.133968][T17733] lo speed is unknown, defaulting to 1000 [ 2985.150866][T17733] virt_wifi0 speed is unknown, defaulting to 1000 00:09:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfe0f0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000002240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000002c00270d000001000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000080008000b000100666c6f77657200000400021400"], 0x34}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x10, 0x3f6, 0x100, 0x70bd27, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x84}, 0xc000) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) 00:09:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2985.191391][T17737] IPVS: ftp: loaded support on port[0] = 21 00:09:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2985.381773][T17737] lo speed is unknown, defaulting to 1000 [ 2985.838674][T17737] virt_wifi0 speed is unknown, defaulting to 1000 [ 2986.036597][ T8446] tipc: TX() has been purged, node left! 00:09:49 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x7, r0}, 0x8) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x140c, 0x912, 0x70bd26, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000850) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000001c0)=0x10, 0x4) r2 = socket(0x27, 0x1, 0x80) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) r3 = accept4$inet(r2, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000340)={'nat\x00', 0x0, 0x4, 0x6c, [], 0x3, &(0x7f0000000280)=[{}, {}, {}], &(0x7f00000002c0)=""/108}, &(0x7f00000003c0)=0x78) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000400)={{0x0, 0x0, @identifier="2b48be177be030e60a5abf62c91e03a1"}}) getsockopt$IP_SET_OP_VERSION(r3, 0x1, 0x53, &(0x7f0000000480), &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast2, 0x4}}, 0x9, 0x1, 0x8, 0x8, 0x2, 0x9, 0x5}, 0x9c) ioctl$SIOCRSACCEPT(r2, 0x89e3) socketpair(0x21, 0x4, 0x8, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r5, 0x8008f513, &(0x7f0000000600)) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='freezer.self_freezing\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000680)=0x3, 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000006c0)={0x200, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1, 0x8, [{{0x2, 0x4e22, @local}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e24, @private=0xa010101}}, {{0x2, 0x4e22, @rand_addr=0x64010102}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e21, @loopback}}]}, 0x490) 00:09:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000001480)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000001540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001500)={&(0x7f0000000400)={0x58, r1, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x44, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4406c73a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x0, 0x5, 0x14ecebf3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3748190d}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6285cef5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55895976}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}]}]}]}, 0xffffffffffffff6b}, 0x1, 0x0, 0x0, 0x20000000}, 0x50) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") clock_gettime(0x5, &(0x7f0000000140)) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) r6 = gettid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r6) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x2, 0xffffffffffffffff}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r6, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00', r7}, 0x30) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000001580)=r6) r8 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000001840)=@hci, 0x80, &(0x7f0000001640)=[{&(0x7f0000000040)=""/11, 0xb}, {&(0x7f00000015c0)=""/104, 0x68}, {&(0x7f00000000c0)=""/39, 0x27}, {&(0x7f00000016c0)=""/17, 0x11}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001700)=""/102, 0x66}, {&(0x7f0000001780)=""/154, 0x9a}, {&(0x7f0000000380)=""/92, 0x5c}], 0x8, 0x0, 0x17}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000240)={@ipv4={[], [], @multicast2}, 0x7d, r3}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x4c}}, 0x0) 00:09:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) 00:09:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfe340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2988.436064][T17856] device vlan2 entered promiscuous mode [ 2988.484421][T17856] device bond0 entered promiscuous mode [ 2988.507502][T17856] device bond_slave_0 entered promiscuous mode 00:09:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2988.537393][T17856] device bond_slave_1 entered promiscuous mode 00:09:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x11, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) pwrite64(r2, &(0x7f0000000240)="38ef4e44ab0774a66f1ca595163bb07f8acc416f19bd8f52d9521bae73c5043c5a2bd7347565e7c1fe3796b8226fd8fff80303078874d30cdd2af5ecc99c89d44cf72aaff4a6fe06c3ef3f81622a1f6f6533d89b09dffa33b8e39dedeaeef0cffde0a898a8a550ca29c3ba2d1a1bb1c12e2e42cec1902259d4fa7b06dbd5e5e44c7fd4ae28f80b0415bbec850e0606a5dbf459af18a4e9271d45aa1114a27835bdbbc80d518bef1001226375e5dec9f6ef7c01aaf18d3c1ad2acfe6c98783597e5c433378fa5", 0xc6, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x32, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000070601030000000040000000000000000500010007"], 0x1}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f00000000c0)={0x8, 'veth0_macvtap\x00', {'macvtap0\x00'}, 0xff}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r3, 0x0, 0x100000001) [ 2988.606172][T17856] device bond0 left promiscuous mode [ 2988.631290][T17856] device bond_slave_0 left promiscuous mode [ 2988.660627][T17856] device bond_slave_1 left promiscuous mode 00:09:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2988.814223][ T27] audit: type=1804 audit(1597018189.834:2577): pid=17871 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir517912301/syzkaller.MND1Gw/2907/cgroup.controllers" dev="sda1" ino=16361 res=1 00:09:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2988.924663][T17876] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) setsockopt$inet6_dccp_int(r4, 0x21, 0x2a, &(0x7f0000000140)=0x1000, 0x4) [ 2989.235860][T17859] device bond0 entered promiscuous mode [ 2989.244037][T17859] device bond_slave_0 entered promiscuous mode [ 2989.253270][T17859] device bond_slave_1 entered promiscuous mode [ 2989.261903][T17859] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2989.277454][T17859] device bond0 left promiscuous mode [ 2989.295411][T17859] device bond_slave_0 left promiscuous mode [ 2989.321159][T17859] device bond_slave_1 left promiscuous mode [ 2989.596886][T17871] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.695671][T17881] device bond0 entered promiscuous mode [ 2989.715271][T17881] device bond_slave_0 entered promiscuous mode [ 2989.731961][T17881] device bond_slave_1 entered promiscuous mode [ 2989.751541][T17881] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2989.779802][T17881] device bond0 left promiscuous mode [ 2989.794459][T17881] device bond_slave_0 left promiscuous mode [ 2989.811027][T17881] device bond_slave_1 left promiscuous mode 00:09:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000008100)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x10}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_HASH={0x8}]}}]}, 0x38}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000007c0)={r5, 0x1, 0x8, 0x3}) sendto$rose(r8, &(0x7f0000000800)="774c8d4ff8255346c0d4f0d9305fe8b0944d5e13089b8e60591ca36aae899fb7f137074326adae9e1327f3721720b94a37a6ef24b930253e931c835861cc", 0x3e, 0x20044000, &(0x7f0000000840)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) 00:09:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000061, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, r2, 0xee01}, 0xc) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0x3, @default, r2}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x2, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dbc, 0x47ff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="010000006397e812a8e77bc263c5386536b8ec2f8775b543d40a13d6d0ac4a6d09ee1da863f25fdc548e94db9d46d003253bd1a9b1bfe4221119bffd0d52572f0f27e354830f997061f28254c6a231432fa8894683ccb7db28ffec672b366fc3003bfd0f6fe8f7d2da28ad0bf82e1a74f8b61ddbb5a9544b54aa2a4591bd800be87b018cc6ece49ae011cc51f563345f9b772c0cacb4371582b806cf806ee7b1314dd4a3", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYBLOB="130000889222b80e47556d869f10068e67ea83c446e521bc07a5d197a71e8f226c891a8c8cee913945557163edcf4412523cb990c8c582596085988f5796c0172ec979c7c251c8611fdf1a64b773147d"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4, 0x294}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000000c0)={r4, 0x1}, 0x8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 00:09:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) 00:09:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4a03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:51 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000940)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r1, {0x7ffd}, {0xffff, 0xffff}, {0x5}}}, 0x24}}, 0x0) 00:09:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2990.575385][T17915] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2990.645775][T17921] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeffffff}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:51 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x5, 0x2, 0x3}, 0x10) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000063c0)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}}, 0x24}}, 0x0) 00:09:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) 00:09:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2990.983850][T17954] device vlan2 entered promiscuous mode [ 2990.996898][T17954] device bond0 entered promiscuous mode [ 2991.007843][T17954] device bond_slave_0 entered promiscuous mode [ 2991.014226][T17954] device bond_slave_1 entered promiscuous mode [ 2991.042147][T17954] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 2991.064639][T17954] device bond0 left promiscuous mode 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4b03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2991.099521][T17954] device bond_slave_0 left promiscuous mode [ 2991.121952][T17954] device bond_slave_1 left promiscuous mode 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) accept(r0, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4c03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2991.810022][T17955] bond0: (slave vlan4): Opening slave failed [ 2991.937657][T17956] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2991.968320][T17990] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:53 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) 00:09:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) accept(r1, &(0x7f0000000040)=@caif=@rfm, &(0x7f0000000100)=0x80) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=@getsa={0x214, 0x12, 0x200, 0x70bd25, 0x25dfdbfd, {@in6=@local, 0x4d6, 0x2, 0x33}, [@encap={0x1c, 0x4, {0x3, 0x4e24, 0x4e24, @in6=@remote}}, @replay_esn_val={0x34, 0x17, {0x6, 0x70bd25, 0x70bd27, 0x70bd2b, 0x70bd2d, 0xe2d9, [0x5, 0x9, 0x800, 0x400, 0x79fd, 0x0]}}, @tmpl={0x184, 0x5, [{{@in=@local, 0x4d4, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x4, 0x0, 0xfa, 0x3, 0xfffffffa, 0x9}, {{@in6=@ipv4={[], [], @loopback}, 0x4d6, 0x32}, 0x2, @in6=@empty, 0x3500, 0x1, 0x0, 0x9f, 0x1f, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x6c}, 0x0, @in=@broadcast, 0x0, 0x2, 0x3, 0xf9, 0xdd32, 0x4, 0x837}, {{@in=@rand_addr=0x5, 0x4d2, 0x33}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3507, 0x1, 0x0, 0x20, 0x95, 0x1, 0x83a}, {{@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d3, 0x2b}, 0xa, @in=@local, 0x3505, 0x3, 0x1, 0x3, 0x4, 0x3}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3500, 0x2, 0x0, 0x9, 0x1, 0x80000001, 0x5}]}, @tfcpad={0x8, 0x16, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x3}, @etimer_thresh={0x8, 0xc, 0x2}]}, 0x214}, 0x1, 0x0, 0x0, 0x80}, 0x4014) 00:09:53 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2992.221503][T18012] net_ratelimit: 191 callbacks suppressed [ 2992.221510][T18012] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 00:09:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$rxrpc(0x21, 0x2, 0xa) socket$rxrpc(0x21, 0x2, 0xa) socket$rxrpc(0x21, 0x2, 0x2) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r8}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="0c65908e000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 00:09:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2992.386506][T18009] bond0: (slave vlan4): Opening slave failed 00:09:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4d03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2992.546665][ T27] audit: type=1804 audit(1597018193.564:2578): pid=18026 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3943/cgroup.controllers" dev="sda1" ino=16365 res=1 00:09:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2992.968132][T18026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:54 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff340d00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:54 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) 00:09:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x8) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r3, 0x401, 0x101, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r6, &(0x7f0000000140)="787c4e0e4b037ab550df735cdd12fdb10d535e107b6b73bffdfbac303d042b26b11380aba40f31d725751160dc2d2ef84ca60185329a6c54dcffb362ecd37250720dbef1a398fb5de373d174fba08ba2dc186fa0b2", &(0x7f00000001c0)=""/12}, 0x20) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x4, 0x0, &(0x7f00000000c0)) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r7, r1, 0x0, 0x100000001) 00:09:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2993.478776][ T27] audit: type=1804 audit(1597018194.504:2579): pid=18056 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3944/cgroup.controllers" dev="sda1" ino=16378 res=1 [ 2993.480024][T18056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4e03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2993.645411][T18061] bond0: (slave vlan4): Opening slave failed 00:09:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) recvfrom(r1, &(0x7f0000000100)=""/89, 0x81, 0x1, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000040)={0x2, 'gretap0\x00', {0x3a16a234}, 0x498c}) [ 2993.893455][T18063] device vlan2 entered promiscuous mode [ 2993.944312][T18063] device bond0 entered promiscuous mode [ 2993.972357][T18063] device bond_slave_0 entered promiscuous mode [ 2993.998375][T18063] device bond_slave_1 entered promiscuous mode [ 2994.038937][T18063] device bond0 left promiscuous mode [ 2994.044252][T18063] device bond_slave_0 left promiscuous mode [ 2994.069697][T18063] device bond_slave_1 left promiscuous mode [ 2994.297018][T18082] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:55 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f0000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) 00:09:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000100)=0x2, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0xffff, @dev={0xac, 0x14, 0x14, 0x3f}}, 0xffffffffffffffe4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="5c000000100001042bbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="25330000000000002c00128009000100766c616e000000001c0002800600010013000000040003800c0002001f0000001300000008000500", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5c}}, 0x0) r3 = accept(r2, &(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000240)=0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x23, &(0x7f00000001c0)={r6}, 0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYBLOB="ff7f030009002200610002404675e9ab675438782ed6fda089d5979c9e0321d343f7c42aa08b3d8273c1e3a41c1e02dc9a0943ecfad8dfa91c761c4fe502737eb67b00e46ae12e4df44c1191e7a5551fc74e3b21c231a015c9"], 0xe) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000440)={r6, @in6={{0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00', 0x7}}}, &(0x7f0000000500)=0x84) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'syz_tun\x00', 0x3}, 0x18) [ 2994.358644][T18085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:55 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="00000000000000001400120700000000627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010001fff0000056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00000000280012800a00010076786c616e00000018000280140013", @ANYRESOCT=r0, @ANYRESHEX=r4, @ANYRESDEC=r5, @ANYRESHEX=r6], 0x3}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r7, 0x0, 0x4ffe2, 0x0) [ 2994.467247][T18097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4f03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2994.535575][T18097] device vlan4 entered promiscuous mode 00:09:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5000}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2995.603087][T18115] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2995.638142][T18115] device vlan4 entered promiscuous mode 00:09:56 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffff0300}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) socket$nl_xfrm(0x10, 0x3, 0x6) 00:09:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:56 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x400, 0x0, 0x1}, {}, {0x1f}, {0x5}, {0x9}], @ipv6=@dccp_packet={0x9, 0x6, "25c329", 0x193, 0x21, 0x1, @remote, @private0, {[@srh={0x67, 0xa, 0x4, 0x5, 0x3, 0x60, 0x5, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2, @empty, @dev={0xfe, 0x80, [], 0x2f}, @dev={0xfe, 0x80, [], 0x3c}]}, @routing={0x3a, 0xe, 0x2, 0x9, 0x0, [@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @private0]}], {{0x4e20, 0x4e24, 0x4, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, "c9d757", 0x3, "ec0f14"}, "278c1c2addefccb587176becf4cdfa476e30de92e7fe6c261c5e2dc04f71a73abc740f214d4b5914008f7be9b35c5df6008d82dc31d750623b1d3b1853ddc6be6837aa557915495f62e5724d98292d98ed2f72e5365a31e172c1a04b4c6f13a61d23624a8e95f7e6cece1780a1d2fe2889b074913e8b129837d7b01b4cfe939b8a31f0ef8d6bc853504c2834b5a8a69dcafd50ca922157b202bbb8f43b204f1abcb2200ff4454f4c8704e34e0bacfc978b79d7"}}}}}, 0x1cf) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:09:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x1, 0x10}, &(0x7f0000000300)=0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/386]}, 0x1fa) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vcan0\x00', 0x4}, 0x18) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x2, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@loopback}, 0x22) 00:09:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2995.862264][T18149] device vlan2 entered promiscuous mode [ 2995.876108][T18157] IPVS: stopping master sync thread 28940 ... 00:09:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2995.913947][T18149] device bond0 entered promiscuous mode [ 2995.939807][T18149] device bond_slave_0 entered promiscuous mode 00:09:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x208e24b) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000140)=0x14) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) mmap(&(0x7f0000734000/0x1000)=nil, 0x1000, 0x1000008, 0x80010, r1, 0x1000) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5ea4df00000000e9000500010007"], 0x1}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r9, r8, 0x0, 0x100000001) [ 2995.963598][T18149] device bond_slave_1 entered promiscuous mode [ 2996.018388][T18149] device bond0 left promiscuous mode 00:09:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2996.052917][T18149] device bond_slave_0 left promiscuous mode [ 2996.089414][T18149] device bond_slave_1 left promiscuous mode 00:09:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2996.723639][T18174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2996.735044][ T27] audit: type=1804 audit(1597018197.745:2580): pid=18178 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3948/cgroup.controllers" dev="sda1" ino=16372 res=1 [ 2996.756829][T18177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:57 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:57 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2996.952608][ T27] audit: type=1804 audit(1597018197.975:2581): pid=18180 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3948/cgroup.controllers" dev="sda1" ino=16372 res=1 [ 2997.053855][ T27] audit: type=1800 audit(1597018198.035:2582): pid=18169 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16372 res=0 [ 2997.117576][ T27] audit: type=1800 audit(1597018198.035:2583): pid=18180 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="cgroup.controllers" dev="sda1" ino=16372 res=0 [ 2997.149322][T18174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2997.176463][T18178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:09:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) 00:09:58 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.stat\x00', 0x275a, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000140)={0x9}, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000000000000000001000", @ANYRES32, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[], 0x49c}, 0x1, 0x0, 0x0, 0x40080}, 0x4001) r2 = socket(0x26, 0x800000005, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRES32, @ANYRES32], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2012, r1, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 00:09:58 executing program 4: r0 = socket$inet(0x2, 0x2, 0x73) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000003540)=[{&(0x7f00000001c0)="9e", 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$SIOCPNGETOBJECT(r2, 0x89e0, &(0x7f0000000000)=0xb150) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="110000000000000000000200000008000300", @ANYRES32=r8, @ANYBLOB='\b\x00j\x00\x00\x00\x00\x00\b\x00i'], 0x5}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x200}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_OPMODE_NOTIF={0x5}]}, 0x2c}}, 0x40814) sendmsg$NL80211_CMD_NEW_INTERFACE(r4, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048881}, 0x0) 00:09:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x35, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r4}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'lo\x00', {0x2a, 0x3, 0x2}}) [ 2998.064237][T18244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:59 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffff000}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:09:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:59 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x6, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0xfffffffffffffc9d) [ 2998.160460][T18244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:09:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='pids.events\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x6db6e559) ioctl$FS_IOC_SETVERSION(r1, 0xc0c0583b, &(0x7f0000000000)) 00:09:59 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:09:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@remote, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffe0) 00:09:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x7a05, 0x1700) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000180), 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$tipc2(0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) 00:09:59 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r3, 0x105, 0x0, 0x0, {{}, {0x0, 0x4108}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:09:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:09:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5400}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2998.650126][ T27] audit: type=1804 audit(1597018199.675:2584): pid=18273 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3951/cgroup.controllers" dev="sda1" ino=16373 res=1 [ 2998.755920][ T27] audit: type=1804 audit(1597018199.765:2585): pid=18273 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3951/cgroup.controllers" dev="sda1" ino=16373 res=1 00:10:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff00}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)={0x64, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) 00:10:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5401}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x7a05, 0x1700) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0b") ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000180), 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) syz_genetlink_get_family_id$tipc2(0x0) preadv(r4, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) 00:10:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2999.133074][T18298] device vlan2 entered promiscuous mode [ 2999.165275][T18298] device bond0 entered promiscuous mode [ 2999.180966][T18298] device bond_slave_0 entered promiscuous mode [ 2999.198795][T18298] device bond_slave_1 entered promiscuous mode [ 2999.219286][T18298] device bond0 left promiscuous mode [ 2999.224817][T18298] device bond_slave_0 left promiscuous mode 00:10:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2999.240593][T18298] device bond_slave_1 left promiscuous mode [ 2999.243663][ T27] audit: type=1804 audit(1597018200.265:2586): pid=18295 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3952/cgroup.controllers" dev="sda1" ino=16364 res=1 [ 2999.348178][ T27] audit: type=1804 audit(1597018200.365:2587): pid=18302 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir132364831/syzkaller.9mLpXB/3952/cgroup.controllers" dev="sda1" ino=16364 res=1 00:10:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:00 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x5, 0xa, 0x10}]}, 0x28}}, 0xc0000) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x7, 0x2500, r6, 0xfcffffff}}, 0x20}}, 0x0) 00:10:00 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=@ipv6_deladdr={0x2c, 0x15, 0x200, 0x70bd28, 0x25dfdbfd, {0xa, 0x18, 0x10, 0x14b, r3}, [@IFA_LOCAL={0x14, 0x2, @mcast1}]}, 0x2c}}, 0x800) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000003c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1932529fe6e69fd1", @ANYRES16=r5, @ANYBLOB="0002ff010000fddbdf250500000008000800ac14140f14000500fe8000000000000000000000000000bb"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x40) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r5, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2b}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010102}]}, 0x5c}}, 0x4000010) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet_SIOCGIFDSTADDR(r6, 0x8917, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e21, @local}}) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r7, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r8], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r7, 0x20, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x40060) 00:10:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 2999.690386][T18314] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2999.784301][T18318] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 2999.802688][T18316] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) [ 2999.877003][T18314] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 00:10:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 2999.984622][T18318] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 3000.002985][T18327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:01 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) sendmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1ca7b67686029be1c93d8a4495eefc617d3cbde408db93de0a74b080841d5dacabc9a4d11b127afa58acb78411bf95c74956f9db402e9f7405cac05c1c37805a5c3339af390519305563d35bc43978fc988a462bb5abdae5602bb498716df912e956f4c6e9f9ab6875de7283d4cd571d077180f6701b142b2760bebdf0ceaec5f51b5ca436431145402475dc5879cb803364edf71ee9310cfeb12ea8685e3f643e1f4e8a692c86d13b9424333d", 0xad}, {&(0x7f00000001c0)="c12a132397a9cd475cf677041d9333429de8a4684d05e4a2544fae7abf57c7e3bca689e2ad05", 0x26}, {&(0x7f0000000200)="e817414c2e6ee5347b401e66d4b5f9986838c32fc4b75318ac7551ca57701569cf2b852f3c2ac59983ba6828a4aa396da63d01284902a28573edac094d530e4839c69356a5ec43d563cded36ddf33f0b8b7eba7932169157db6a9838079dc0", 0x5f}], 0x3}}], 0x1, 0x800) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000080)=""/95, &(0x7f0000000000)=0x5f) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r2, &(0x7f00000002c0)={0x1a, 0x201, 0xc1, 0x98, 0xb7, 0xb2, @random="bb1e5411443e"}, 0x10) 00:10:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r3 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r2, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)=ANY=[@ANYBLOB="1ce5ff00", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000000800090000000000"], 0x1c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="05000000009919fc939baa63db19047526d4702da8494538ee9036fe2d5a32fd49854f05a0f49b2b328933947a26ad14cd22aca99dc7012e4a92b108947b2c17b8989d94861ab5976341a6b3a9c99d9c1e64587a13557066e54a3fcd5063ed4a42704c370644bc77347a1499beabacaa106a385bf2630fa00a98c4abaae67da8edeb2cf8dab95f2c76624405340b011d8f6e8d06ca8840d47eb015a575774c6ca2e109b20ea514c2d8510e1ac3e3958bdc2be0577a8d3b6a74cadea62aa5147b6a06541a4a3bd9dff1225f719722294aa1efb6d728a0b4763c1cef0b6d3f4e513a110a0bfe695944275079cf9b26f21aae3d", @ANYRES32=r7, @ANYBLOB="0000001900000000140012000c0001006272696467654c782e65d3294c6e210d8dc88bbfc145af6ab3b7104f0086a91f485327a5078a21f0d73deadfc74426cc2c524f935b4aed9ecfbe86442ddde974029df0e1a3e2be9639036b82aac5b96736fc5aead14ff3a317620a3136c1b30af8802d8fd769f151db0c8d0b44d2e3b260fef7"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="00000084", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf25070000000c0010000104000000000000060003000100000008001700", @ANYRES32=r4, @ANYBLOB="08000b0002000000"], 0x38}, 0x1, 0x0, 0x0, 0x64044880}, 0x8050) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x400, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 3000.091082][T18345] device vlan2 entered promiscuous mode [ 3000.138412][T18345] device bond0 entered promiscuous mode [ 3000.162740][T18345] device bond_slave_0 entered promiscuous mode 00:10:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3000.194548][T18345] device bond_slave_1 entered promiscuous mode 00:10:01 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) splice(r5, &(0x7f0000000100)=0x10000, r8, &(0x7f0000000140)=0x1, 0x2, 0x9) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x5}], {0x95, 0x0, 0x3}}, &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 3000.237259][T18345] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 3000.290879][T18345] device bond0 left promiscuous mode [ 3000.311402][T18345] device bond_slave_0 left promiscuous mode [ 3000.335151][T18345] device bond_slave_1 left promiscuous mode 00:10:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5600}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5601}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3000.774236][T18369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3000.823312][T18365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3000.862188][T18377] device vlan2 entered promiscuous mode [ 3000.871970][T18377] device bond0 entered promiscuous mode [ 3000.881855][T18377] device bond_slave_0 entered promiscuous mode [ 3000.893778][T18377] device bond_slave_1 entered promiscuous mode [ 3000.930322][T18377] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 3000.959005][T18377] device bond0 left promiscuous mode [ 3000.964332][T18377] device bond_slave_0 left promiscuous mode [ 3000.972324][T18377] device bond_slave_1 left promiscuous mode 00:10:02 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5602}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:02 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x10, 0x4, 0x4, 0x4}, 0x40) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESHEX=r1], 0x1}, 0x1, 0x0, 0x0, 0x5}, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r8, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x0, 0x0, 0x7}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4c010}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000040)}, 0x10) 00:10:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0xf000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xf03b0000) sendfile(r1, r0, 0x0, 0x800000000000c) socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x111) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) close(r2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x0, 0xfffffffd, 0x2, 0x8, 0x9}) pwrite64(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) [ 3001.248302][T18396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3001.299718][T18396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:02 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000010000", 0x1c) 00:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5603}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3001.490904][T18411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5700}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3001.565130][T18407] device vlan2 entered promiscuous mode [ 3001.615472][T18407] device bond0 entered promiscuous mode [ 3001.644025][T18407] device bond_slave_0 entered promiscuous mode [ 3001.674427][T18407] device bond_slave_1 entered promiscuous mode [ 3001.734885][T18407] device bond0 left promiscuous mode 00:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5701}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3001.760233][T18407] device bond_slave_0 left promiscuous mode [ 3001.777999][T18407] device bond_slave_1 left promiscuous mode 00:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5702}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5703}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3002.025676][T18412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:03 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffc3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5800}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000058", 0x1c) 00:10:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:03 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x5}, @IFLA_BOND_TLB_DYNAMIC_LB={0x5}]}}}]}, 0x44}}, 0x0) 00:10:03 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r0}, 0x14}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x0) socket(0x22, 0x2, 0x4) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000180)) r4 = socket(0x22, 0x2, 0x4) getsockopt$sock_buf(r4, 0x1, 0x1c, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x64, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_MTU={0x8}]}, 0x64}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)={r7, 0xc9, "8eb3e2733c9aa8a8108a66ff5ea6a23fa1f6b8f975fed178dfd7af0334fdef9a0d30892faf61f6ae491d8a5b9cd1128742be6a41422bde82190a27597c907c5ee18a99da0f41dec8c8276e15272f16ff130b59532469af4bf2103e0f870565b8f0c2f928fa7c3eb73fef520e14fd96a69ec35dd29dd2deb8c7165cea4a2234f12b1f9d998214546aac469198454ac933da12c3766187b24ca4691e8717858c0bb16d0679436505f7f40808b6182a419806e12e9af9eebd364384e7e1184e57033263cff2929ff77f5f"}, &(0x7f0000000000)=0xd1) 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5801}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3002.301782][T18445] device vlan2 entered promiscuous mode [ 3002.314272][T18445] device bond0 entered promiscuous mode [ 3002.320280][T18445] device bond_slave_0 entered promiscuous mode [ 3002.336668][T18445] device bond_slave_1 entered promiscuous mode 00:10:03 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) socket$netlink(0x10, 0x3, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x0, 0x1, @mcast1, 0xfff}}, 0x0, 0x6, 0x10000, 0x3, 0x4}, &(0x7f0000000180)=0x98) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1f4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0xd, 0xa, 0xc9f1b51f36bd4fe7, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x4041) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NFNL_MSG_ACCT_NEW(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x7, 0x5, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x148290cc}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20040004) [ 3002.411336][T18445] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 3002.469856][T18445] device bond0 left promiscuous mode 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5802}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3002.491519][T18445] device bond_slave_0 left promiscuous mode [ 3002.525266][T18445] device bond_slave_1 left promiscuous mode 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5803}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5900}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5901}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:04 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffe4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5902}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) socket(0x10, 0x803, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket(0x10, 0x3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x7, 0x36, 0x8, 0x32}, 0x10) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000f10000008000300", @ANYRES32], 0x4}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="4603fff8", @ANYRES16=r4, @ANYBLOB="ff8308000000ffff0a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 00:10:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000000001c", 0x1c) 00:10:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) pwritev(r1, &(0x7f0000000500)=[{&(0x7f0000001340)="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", 0x536}, {0x0}, {&(0x7f0000000200)}, {0x0}], 0x4, 0x4800000000000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00q\x00E7\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0000000000000000000000001946f34803c6db13e4df3a"], 0x24}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="65727370616e300000144014ecebf6fe", @ANYRES32=0x0, @ANYBLOB="78000001000001000000ff04498c006400660000770490780a0101000a010101441c1331000000000000327b7f00000100000000ac1e00010000000500441c148000000000800000000000784f0000000300000fff00000005830f60ffffffffe000000100000000890796ac1e000100"]}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x4c, 0x0, 0x49e070c0180345a4, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x401}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x41}, 0x0) 00:10:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5903}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88a02, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @multicast2}}) write$tun(r0, &(0x7f0000000240)={@void, @val, @mpls={[], @ipv4=@icmp={{0x8, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x88, 0x0, @dev, @remote}, @timestamp}}}, 0x100c) [ 3003.370629][T18490] device vlan2 entered promiscuous mode 00:10:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3003.414618][T18490] device bond0 entered promiscuous mode [ 3003.437008][T18490] device bond_slave_0 entered promiscuous mode [ 3003.470501][T18490] device bond_slave_1 entered promiscuous mode [ 3003.517089][T18490] device bond0 left promiscuous mode [ 3003.525327][T18490] device bond_slave_0 left promiscuous mode [ 3003.577095][T18490] device bond_slave_1 left promiscuous mode 00:10:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:04 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8, 0x7, 0x9}]}}}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4900000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="8000001f00000000280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 3003.994997][T18517] netlink: 'syz-executor.4': attribute type 7 has an invalid length. 00:10:05 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffa8", 0x1c) 00:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5a03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3004.852134][T18538] device vlan2 entered promiscuous mode [ 3004.862957][T18538] device bond0 entered promiscuous mode [ 3004.870038][T18538] device bond_slave_0 entered promiscuous mode [ 3004.877999][T18538] device bond_slave_1 entered promiscuous mode [ 3004.888933][T18538] device bond0 left promiscuous mode [ 3004.894475][T18538] device bond_slave_0 left promiscuous mode [ 3004.902319][T18538] device bond_slave_1 left promiscuous mode 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:06 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES64=r7], 0x0) 00:10:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:06 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000), 0x10) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000580)) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000005c0)='veno\x00', 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x2, 0x55, 0x8, 0x8, 0x10, 0x1b, 0x5}, &(0x7f00000006c0)=0x9c) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000700)={r3, 0x1, 0xffffffe0, 0x2}, &(0x7f0000000740)=0x10) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000780)={0x2, 0x0, @multicast1}, &(0x7f00000007c0)=0x10, 0x800) getsockopt$inet_buf(r4, 0x0, 0x2f, &(0x7f0000000800)=""/4096, &(0x7f0000001800)=0x1000) connect$vsock_stream(r0, &(0x7f0000001840)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001880)={0xffffffffffffffff, 0x89, 0x5, 0x5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0, 0x0}, &(0x7f0000001900)=0xc) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) epoll_pwait(0xffffffffffffffff, &(0x7f0000001940)=[{}, {}, {}], 0x3, 0x0, &(0x7f0000001980)={[0x7f]}, 0x8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000019c0)={@multicast1, @loopback, 0x0}, &(0x7f0000001a00)=0xc) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000001a40)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2={0xfc, 0x2, [], 0x1}, 0x3, 0x8, 0x400, 0x0, 0x9, 0x3040208, r7}) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r8, 0x1, 0x53, &(0x7f0000001ac0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000001b00)=0x2c) setsockopt$PNPIPE_HANDLE(r5, 0x113, 0x3, &(0x7f0000001b40)=0x8, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000001b80)={0x0, 'virt_wifi0\x00', 0x1}, 0x18) [ 3005.101505][T18562] __nla_validate_parse: 2 callbacks suppressed [ 3005.101513][T18562] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:06 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5b03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x80002, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000300)={@mcast1, 0x0}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x70bd2b, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x80) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x50, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x20, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}}]}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) [ 3005.224824][T18571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000011414", 0x1c) 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3005.306462][T18562] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3005.394230][T18572] device vlan2 entered promiscuous mode [ 3005.447986][T18572] device bond0 entered promiscuous mode [ 3005.459987][T18572] device bond_slave_0 entered promiscuous mode [ 3005.467488][T18572] device bond_slave_1 entered promiscuous mode [ 3005.485748][T18572] device bond0 left promiscuous mode [ 3005.491831][T18572] device bond_slave_0 left promiscuous mode 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3005.505635][T18572] device bond_slave_1 left promiscuous mode [ 3005.658179][T18571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:06 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_LACP_RATE={0x5}]}}}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00000000280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe(&(0x7f0000000040)) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x2, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x5}}}]}, 0x24}}, 0x0) splice(r0, 0x0, r2, 0x0, 0x10000004ffe6, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 00:10:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5c03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3005.753780][T18582] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3005.788527][T18593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:10:06 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000000000e", 0x1c) 00:10:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3005.946876][T18608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 00:10:07 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x4010, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'vlan1\x00', 0x200}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_x25_SIOCDELRT(r1, 0x890b, &(0x7f0000000100)={@null=' \x00', 0x6, 'macvtap0\x00'}) ioctl$FIOCLEX(r1, 0x5451) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000400)='dctcp\x00', 0x6) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000440)="dad4a56736672a6189a3ce5bedd1e2041234d8b9b40e20640c8921339c420a3201a1400c805912ff09da16847ac06d14bc2b55aa452844ebd5806d0ea273b33322f380204a909cb10a6fa04f95db96e692822c3300551fbe550b2d6b07f89d342ebffe0c2e69face08802a6c938d895c4daec656b658be178ec620f34c1bcfb48465702d66c8dc844a39e13ca7adcaeb109c84f48930c2703a47dc24369f8e18035a8f70e4656c53e12326d3b45b81a55c1d61e094655fcdd32b151078369a254852b785d2f4becc080c7fd33462", &(0x7f0000000540)=""/160}, 0x20) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, &(0x7f0000000600)=0x2a) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e22, @rand_addr=0x64010102}, {0x2, 0x4e20, @rand_addr=0x64010101}, {0x2, 0x4e22, @multicast1}, 0x201, 0x0, 0x0, 0x0, 0x5, &(0x7f00000003c0)='ip6gretap0\x00', 0x0, 0x2, 0x7}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000200)=0x1, 0x4) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x3a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}, {0xa, 0x4e24, 0x4000000, @mcast1, 0x3ff}, 0x7, [0x9, 0x2, 0x1, 0x1, 0x4d0e, 0x800, 0x8, 0x8ab4]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0xfffffffd, @empty, 0x2}, {0xa, 0x4e23, 0x0, @mcast1, 0x3}, 0x7, [0x6, 0x0, 0x1, 0xfffffffd, 0x7ff, 0x7fff, 0x8, 0x1]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0xce21, 0xfffffffc, @mcast1, 0x916d}, {0xa, 0x4e23, 0x8651, @mcast1, 0x7}, 0x0, [0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x400, 0x8000000]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, 0x0, 0x0) [ 3005.993502][T18608] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:10:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 00:10:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) [ 3006.121344][T18622] IPVS: ftp: loaded support on port[0] = 21 [ 3006.144869][T18621] device vlan2 entered promiscuous mode 00:10:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3006.173136][T18621] device bond0 entered promiscuous mode [ 3006.191873][T18621] device bond_slave_0 entered promiscuous mode [ 3006.219761][T18621] device bond_slave_1 entered promiscuous mode [ 3006.243599][T18621] bond0: (slave vlan2): slave is up - this may be due to an out of date ifenslave [ 3006.260366][T18621] device bond0 left promiscuous mode [ 3006.265894][T18621] device bond_slave_0 left promiscuous mode [ 3006.273535][T18621] device bond_slave_1 left promiscuous mode [ 3006.471235][T18622] lo speed is unknown, defaulting to 1000 [ 3006.478886][T18622] virt_wifi0 speed is unknown, defaulting to 1000 00:10:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 00:10:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000088a8ff", 0x1c) 00:10:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 3006.669379][T18622] IPVS: ftp: loaded support on port[0] = 21 [ 3006.687177][T18622] lo speed is unknown, defaulting to 1000 [ 3006.693999][T18622] virt_wifi0 speed is unknown, defaulting to 1000 00:10:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e2800000000000000f0ff", 0x1c) 00:10:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5d03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) socketpair(0x18, 0x1, 0x1, &(0x7f0000000800)) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 00:10:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @func_proto]}}, &(0x7f0000000380)=""/221, 0x3e, 0xdd, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000700)={0x62c57de1651dcfb8, 0x2}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ppp\x00', 0x80002, 0x0) r3 = socket(0x10, 0x1, 0x5) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x44880) sendmsg$unix(r3, &(0x7f00000006c0)={&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x51, &(0x7f0000000400)=[{&(0x7f0000000900)="6a154e60b19d3618c645a61e2abb2b676bbf565740d05211fbe9a62c91fb7622dede2270bd05b3750e628461641007bdeda2340d78a42f1127bca90ac7e5fa4313fb2644f8d837466dfd05889bc515eb05cc553c3fae57f0bd8301dfa78867aadb488433758122b99112bc45e3e46822ed9b82689ff1f384cd1e471911e9cd57916c8c6f28ed54101a3ca2388e6b383e5e6613532183a095acd34d7b5bb9bddaba57b8911f1ab9923f42a0397929f17db3b8cca94f4ea580c7505ca0d752fcfeefe85d68b57fdbd28c691debed4713b9be634da70cd4f60b8df31b7b84ef2b0e96b68c4cae27c37a67277bd991fd82aa1df317a9", 0x87}, {&(0x7f0000000000)="8f3ace4b6a766e453e3229049c0523ac0e78b7929e45ab8257f6ca5b45b32424eb72dd51863f81d78dd6b8", 0x2b}, {&(0x7f0000000100)="70241c49d85a353827fd16cc21a3", 0xe}, {&(0x7f0000000380)="fbcb5e531a557f078bf0c43df860c0f84d540a64e7ee0e88032a94962d21edad85b75b1d4eba862719482a39aaaaa03e3bfcd6ab940fe6553f68111fcdb698c13ca4e739f0f1b2a8", 0x48}, {&(0x7f00000007c0)="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", 0xa0}, {&(0x7f00000004c0)="540ae89df3d21707fcb768aacd691327dc70a950ed47fe36320f6a1d5da4b0d4ca3e43bb2e401f0a84cbc70bad8e1659a30517b58979ca1d351a7b13c6d0b8663139c32db1debc49dc5a9955a4ee51e184ddc61b5d02ce92ab79adcf59e525d022445cf309a7e8abafad3c78043e1e1fa84f", 0x72}, {&(0x7f0000000180)="a0b9c607a990b5d6194f441a04fbbe9e", 0x10}, {&(0x7f0000000540)="ef8bf68c64c9527bd4d2ecf2d629d9035d811dbcab0a0db723f7b60adef5045e5e28f5693488d55b3d4d9751438518e7bededcf3df50144f1a8f9916cd72590e81256d51e7388a4a95bd5147fe8cdd59a7f876eb85677aa01474f1627704b04fe2190d6f65fcb8b22c4c609896b123e9289486ad54d5d3", 0x77}, {&(0x7f00000005c0)="900575c34d1d097798525b4c063d0466c6ff80d83b39f49839d04abe5d97f4fab8c361d6", 0xfffffffffffffff7}, {&(0x7f0000000a00)="daa0a0b51f3019bf31912929973906cf80d581c69adbc996bed7bf8cec994ccc29f448ea350bb9349b1e84e7e6a1feaef97ccb4f69b8b6ae193146a358f1be0f43dd2d21a404d50faa523295c4ba60a0537effb0afc3a2802da9c114a592ea619e5ff406000706c9be9b29626a470963204e61b463a0499c69611b59b84718bb2b4116bf3641de9b5c8fd8748c11f66ca179d95da6a087ceb23c92b0b9292c4bbecaa921e3def1c550b5eca9764599c9ac52c0c8694e6f48158063abd8fa9bc1733d9dccd452cf69c7b2ee5b2741641f792b4144eef668f6ab622a"}], 0x9, 0x0, 0x0, 0x40891}, 0x4000820) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000780)=0x4) r4 = accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0xffffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @loopback}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) unshare(0x4060000) sendfile(r2, r1, 0x0, 0x100000001) 00:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e280000000000009effff", 0x1c) 00:10:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) ioctl(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x28011, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="84440cf2c264032eae35d3e9be79fcb6060a7fa807acb2f25602989113396bc2cd40d711a143ee2bb17cba59da5aef896a166cb06b87f31cd206b82e807fda46d879ea471f1f1bd7bdbf99f62f72e47f4dcb7905c133f080fdcb51595f2be5a7a79a570865", 0x65}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) socket$xdp(0x2c, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000880)={&(0x7f0000001000)=""/102400, 0x120000, 0x1000, 0x4}, 0x20) 00:10:08 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) [ 3007.653731][ T647] tipc: TX() has been purged, node left! 00:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000f0ffff", 0x1c) [ 3007.830762][ T27] audit: type=1804 audit(1597018208.855:2588): pid=18711 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir517912301/syzkaller.MND1Gw/2927/cgroup.controllers" dev="sda1" ino=16383 res=1 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5e03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f00}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f01}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:09 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000180)={@remote, @random="506f52ccbdb3", @val={@void, {0x8864}}, {@ipv6={0x86dd, @udp={0x0, 0x6, "ff49c0", 0xc, 0x11, 0x0, @local, @empty, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) 00:10:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f02}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='cdg\x00', 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket(0x10, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000000000000000000000000006bd6", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r5}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r7 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r6, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000880)={0x1c, r6, 0x1, 0x0, 0x0, {0x3}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r6, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4099}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x1, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x3, 0x3}, {0x5}, {0x8, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x4) sendto$inet6(r0, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1f4) 00:10:09 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000ffffff", 0x1c) 00:10:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000040)) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x48) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delvlan={0x24, 0x71, 0x6bc6711ac5763745, 0x0, 0x0, {0x7, 0x0, 0x0, r6}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, 0x0, 0xb, 0x401, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x48800) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x30, 0x26}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb5, &(0x7f000000cf3d)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x78) 00:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x5f03}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a5900df00000000e9000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) socketpair(0xa, 0x2, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000100)={{0x2, 0x4e24, @remote}, {0x1, @random="a5052c7edf28"}, 0x62, {0x2, 0x4e21, @broadcast}, 'veth1_vlan\x00'}) 00:10:09 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6000}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3009.047663][ T27] audit: type=1804 audit(1597018210.075:2589): pid=18777 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir517912301/syzkaller.MND1Gw/2929/cgroup.controllers" dev="sda1" ino=16381 res=1 [ 3009.303455][T18771] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3009.342334][T18781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:10:10 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:10 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6001}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:10 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) readv(r0, &(0x7f00000013c0)=[{0x0}, {0x0}], 0x2) close(r2) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES16=0x0, @ANYBLOB="3f3e0586efcd79d447e782cd75e0562da3cf65b47ebebea531462b4202c56468fcf55855726d8ad3316654a3ed166858695cb6a656336738df65d810ee34c2f075be45c290b60bdcaf84830e6b218eda20e8a3670a3252b8f419eb950005d6781e85dd3f747ef5ecfce74b825fac887d666e031e23f504b01a8a0c91dd966863002691d25ab433415438fb41c8ca0a0d1d77e42917562c651905b09e6fbac0a993b0ccc4d907b7a9e7b736606ec3baa03529a87bfd63f7fb1776c02be31503f70000000000000000000000000000f5", @ANYRES16=r3, @ANYRES64=r4, @ANYRESOCT], 0x37cb1133) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) socket$phonet(0x23, 0x2, 0x1) socket$inet(0x2, 0x3, 0x33) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0xffff, @multicast1}, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000000)=""/1, &(0x7f0000000040)=0x1) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x30, 0x0, &(0x7f0000001f40)) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 00:10:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmsg$can_j1939(r1, &(0x7f0000003400)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000003380)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/164, 0xa4}, {&(0x7f0000001180)=""/233, 0xe9}, {&(0x7f0000001280)=""/41, 0x29}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/133, 0x85}], 0x7}, 0x41) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000000)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000003440)={r5, 0x41, "818fba8fc6277ce53ff19aaac06b5d19bc4b571ee66bccbe0a2611ec15217ec6ec7054f2b27f12cef3741934554b1f155eaf09d4c3c57fb175d1f92f53ba9da8ce"}, &(0x7f00000034c0)=0x49) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$inet(r6, &(0x7f0000003500)={0x2, 0x0, @local}, &(0x7f0000003540)=0x10) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x1a, 0x0, &(0x7f0000000080)) 00:10:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="11000000000014000000450000280000000000069078ac1e0001ffffffff00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000003af46890780000"], 0x32) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x211}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, r3, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004090}, 0x44090) 00:10:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6002}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6003}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 3009.992525][T18838] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 00:10:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6100}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:11 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x38, &(0x7f0000000140)}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x20}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000b80)) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, 0x0, 0x0) 00:10:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6101}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e000a0003000200c03737153e370a00118000000000d1bd", 0x2e}], 0x1}, 0x40840) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e23, 0xfffffff7, @ipv4={[], [], @rand_addr=0x64010102}, 0x8001}, {0xa, 0x4e22, 0x101, @empty, 0x7}, 0xc171, [0x80000001, 0x40, 0x8, 0x4, 0x8, 0xfffffffd, 0x5, 0x7fffffff]}, 0x5c) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) bind$rxrpc(r2, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2, 0x4}}, 0x24) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000ec00000000000000038973d8acd122df2e29c075f482d9df560279c893a69e9851ef0c47aea598d4f04764556b57256fc1ad51b6d2cabc8422ef225357dda555bb8573cfc66c527f4aabbddde5b34bdcc46f9bd23c38cf"], 0x18}}], 0x1, 0x0) recvfrom$rxrpc(r2, 0x0, 0xfffffffffffffe7c, 0x80012000, 0x0, 0x0) connect$pppoe(r2, &(0x7f0000001100)={0x18, 0x0, {0x4, @remote, 'bridge0\x00'}}, 0x1e) socket(0x2000000000000021, 0x2, 0x10000000000002) r3 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r3, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xff72}, 0x10040) sendto$rxrpc(r2, &(0x7f0000000180)="8ad88b94026fab332cb9edad6046811935a2279c462c2523596b883f34be2cf7b8c04bd8f186d5e22e084632601cc71961b7e7b5095259f92b53aab067d3c4478698d8c6b3af04a0d04e6966ba84d9d8c8cafe27e2df7b4df4a348c593e1f820e0f4bcd3dc2a33784a7dcc68edec5b2520a7120f42a076bd9c246397397aba0b7eb0474ed0c9fc4d9d265ceb523411ebf3be0d364e40bbe4b8a07cb18a4a4abca150a1c4f34a8407d211484a3249cda163f150409224451c224f2dff", 0xbc, 0x1, &(0x7f0000000080)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @private=0xa010101}}, 0x24) socket(0x29, 0x80000, 0x101) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000240)={0x2}, 0x4) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @remote}}, 0x20) 00:10:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 3011.134762][T18869] team0: Device vlan2 is already an upper device of the team interface 00:10:12 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6200}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:12 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x83, &(0x7f0000000000), 0x8) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000040000000000000000000000000000000004000000000000000000000e0000000000000000000000000000000000000000000000000000000000000000faffffffffffffff000000"], 0x68) pipe(&(0x7f0000000240)={0xffffffffffffffff}) accept4$alg(r2, 0x0, 0x0, 0x0) 00:10:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 3012.472452][T18940] IPVS: ftp: loaded support on port[0] = 21 [ 3012.482180][T18960] IPVS: ftp: loaded support on port[0] = 21 [ 3012.510891][T18940] lo speed is unknown, defaulting to 1000 [ 3012.518063][T18960] lo speed is unknown, defaulting to 1000 [ 3012.524857][T18960] virt_wifi0 speed is unknown, defaulting to 1000 [ 3012.678305][T18940] virt_wifi0 speed is unknown, defaulting to 1000 [ 3012.882441][ T647] tipc: TX() has been purged, node left! 00:10:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000071003b6ff48abfcdd08c354537000000", @ANYRES32=r8, @ANYBLOB="0c0001800800010000000100"], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl2\x00', r8, 0x4, 0x4, 0x7, 0xffffffff, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, 0x707, 0x7, 0xdd4, 0x66}}) sendmsg$nl_route(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="58000000140008002dbd7000fcdbdf25022001fd", @ANYRES32=r9, @ANYBLOB="08000100f000000208000100e000000114000600d50300000000000003000032dba22acf8524725b81a4000688008f4700008100000006000000ffffff00"/75], 0x58}, 0x1, 0x0, 0x0, 0x4880}, 0x80) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$llc(r1, &(0x7f0000000080)={0x1a, 0x104, 0x80, 0x81, 0x20, 0x5, @dev={[], 0xd}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000024fc6004000280ff016000386d64b5a9c4dc142a33023d0001000000b8cd70c5ffffffffffff000000", 0x43}], 0xffffffffffffdaf}, 0x1) 00:10:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:15 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}, @IFLA_VLAN_EGRESS_QOS={0x4}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x5c}}, 0x0) 00:10:15 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x8000, @mcast1}], 0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="08b90000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x24) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00', 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)='\\', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/62, &(0x7f0000000100)=0x3e) 00:10:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 3014.315769][T19013] __nla_validate_parse: 2 callbacks suppressed [ 3014.315778][T19013] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 00:10:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000100)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) 00:10:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 00:10:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x6203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 00:10:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 3055.783322][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 3119.359021][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 3119.366343][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): [ 3119.366434][ C1] ------------[ cut here ]------------ [ 3119.379436][ C1] WARNING: CPU: 1 PID: 19016 at kernel/sched/core.c:3013 try_invoke_on_locked_down_task+0x214/0x2c0 [ 3119.390160][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 3119.396720][ C1] CPU: 1 PID: 19016 Comm: syz-executor.4 Not tainted 5.8.0-syzkaller #0 [ 3119.405058][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3119.415082][ C1] Call Trace: [ 3119.418337][ C1] [ 3119.421168][ C1] dump_stack+0x18f/0x20d [ 3119.425473][ C1] panic+0x2e3/0x75c [ 3119.429350][ C1] ? __warn_printk+0xf3/0xf3 [ 3119.433935][ C1] ? printk+0xba/0xed [ 3119.437887][ C1] ? log_store.cold+0x16/0x16 [ 3119.442535][ C1] ? __warn.cold+0x5/0x45 [ 3119.446836][ C1] ? __warn+0xd6/0x1f2 [ 3119.450876][ C1] ? try_invoke_on_locked_down_task+0x214/0x2c0 [ 3119.457087][ C1] __warn.cold+0x20/0x45 [ 3119.461427][ C1] ? try_invoke_on_locked_down_task+0x214/0x2c0 [ 3119.467639][ C1] report_bug+0x1bd/0x210 [ 3119.471942][ C1] handle_bug+0x38/0x90 [ 3119.476069][ C1] exc_invalid_op+0x14/0x40 [ 3119.480543][ C1] asm_exc_invalid_op+0x12/0x20 [ 3119.485366][ C1] RIP: 0010:try_invoke_on_locked_down_task+0x214/0x2c0 [ 3119.492273][ C1] Code: 45 31 f6 49 39 c0 74 3a 8b 74 24 38 49 8d 78 18 4c 89 04 24 e8 6d 95 08 00 4c 8b 04 24 4c 89 c7 e8 71 c4 a0 06 e9 29 ff ff ff <0f> 0b e9 86 fe ff ff 4c 89 ee 48 89 ef 41 ff d4 41 89 c6 e9 11 ff [ 3119.511865][ C1] RSP: 0018:ffffc90000da8bd8 EFLAGS: 00010046 [ 3119.517900][ C1] RAX: 0000000000000000 RBX: 1ffff920001b517d RCX: 0000000000000001 [ 3119.525879][ C1] RDX: 0000000000000000 RSI: ffffffff81610310 RDI: ffff88802a4de140 [ 3119.533822][ C1] RBP: ffff88802a4de140 R08: 0000000000000033 R09: ffffffff89bcb3c3 [ 3119.541763][ C1] R10: 0000000000005460 R11: 0000000000000001 R12: ffffffff81610310 [ 3119.549706][ C1] R13: ffffc90000da8d00 R14: ffff88802a4de4c0 R15: ffff8880ae736c40 [ 3119.557652][ C1] ? force_qs_rnp+0x470/0x470 [ 3119.562340][ C1] ? force_qs_rnp+0x470/0x470 [ 3119.567031][ C1] ? cpus_share_cache+0x100/0x100 [ 3119.572026][ C1] ? lock_is_held_type+0xbb/0xf0 [ 3119.576938][ C1] rcu_sched_clock_irq.cold+0x92e/0xccd [ 3119.582456][ C1] ? lock_downgrade+0x830/0x830 [ 3119.587278][ C1] ? rcutree_dead_cpu+0x10/0x10 [ 3119.592098][ C1] ? lockdep_hardirqs_off+0x89/0xc0 [ 3119.597271][ C1] ? trace_hardirqs_off+0x27/0x210 [ 3119.602370][ C1] update_process_times+0x25/0xa0 [ 3119.607364][ C1] tick_sched_handle+0x9b/0x180 [ 3119.612187][ C1] tick_sched_timer+0x1d1/0x2a0 [ 3119.617009][ C1] __hrtimer_run_queues+0x1d5/0xfc0 [ 3119.622192][ C1] ? tick_init_jiffy_update+0x1d0/0x1d0 [ 3119.627712][ C1] ? lockdep_hardirqs_on+0x81/0xf0 [ 3119.632796][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 3119.638762][ C1] ? ktime_get_update_offsets_now+0x1c4/0x250 [ 3119.644803][ C1] hrtimer_interrupt+0x32a/0x930 [ 3119.649721][ C1] __sysvec_apic_timer_interrupt+0x142/0x5e0 [ 3119.655672][ C1] asm_call_on_stack+0xf/0x20 [ 3119.660322][ C1] [ 3119.663238][ C1] sysvec_apic_timer_interrupt+0xb2/0xf0 [ 3119.668845][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3119.674884][ C1] RIP: 0010:__sctp_v6_cmp_addr+0x214/0x520 [ 3119.680663][ C1] Code: 00 e8 70 76 0a fa 66 41 83 fd 0a 0f 84 8b 01 00 00 e8 00 7a 0a fa 44 89 ee bf 02 00 00 00 e8 53 76 0a fa eb bb e8 ec 79 0a fa <4c> 8d 6b 08 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 80 [ 3119.700249][ C1] RSP: 0018:ffffc90013aaf870 EFLAGS: 00000246 [ 3119.706297][ C1] RAX: 0000000000040000 RBX: ffff88803dcad320 RCX: ffffc90011171000 [ 3119.714239][ C1] RDX: 0000000000040000 RSI: ffffffff8769a2f4 RDI: 0000000000000002 [ 3119.722180][ C1] RBP: ffffc90013aaf950 R08: 0000000000000001 R09: ffff888022c738bb [ 3119.730136][ C1] R10: 000000000000000a R11: 0000000000000001 R12: 000000000000000a [ 3119.738078][ C1] R13: 000000000000000a R14: ffffffff8a9a9b00 R15: 0000000000000001 [ 3119.746030][ C1] ? __sctp_v6_cmp_addr+0x214/0x520 [ 3119.751201][ C1] sctp_v6_cmp_addr+0x1a/0xd0 [ 3119.755851][ C1] sctp_bind_addr_state+0x103/0x1d0 [ 3119.761109][ C1] sctp_copy_local_addr_list+0x217/0x4e0 [ 3119.766717][ C1] ? sctp_v4_copy_addrlist+0x690/0x690 [ 3119.772149][ C1] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 3119.778039][ C1] sctp_bind_addr_copy+0xde/0x460 [ 3119.783037][ C1] sctp_connect_new_asoc+0x1cd/0x770 [ 3119.788294][ C1] ? sctp_bind+0xd0/0xd0 [ 3119.792515][ C1] ? mark_held_locks+0x9f/0xe0 [ 3119.797251][ C1] ? __local_bh_enable_ip+0xd1/0x190 [ 3119.802507][ C1] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 3119.808459][ C1] ? lock_sock_nested+0x94/0x110 [ 3119.813366][ C1] ? trace_hardirqs_on+0x5f/0x220 [ 3119.818373][ C1] ? security_sctp_bind_connect+0x8f/0xc0 [ 3119.824063][ C1] sctp_sendmsg+0x1377/0x1cf0 [ 3119.828716][ C1] ? sctp_setsockopt+0x9380/0x9380 [ 3119.833817][ C1] ? lock_is_held_type+0xbb/0xf0 [ 3119.838742][ C1] ? aa_af_perm+0x230/0x230 [ 3119.843272][ C1] inet_sendmsg+0x99/0xe0 [ 3119.847577][ C1] ? inet_send_prepare+0x4d0/0x4d0 [ 3119.852658][ C1] sock_sendmsg+0xcf/0x120 [ 3119.857046][ C1] __sys_sendto+0x21c/0x320 [ 3119.861520][ C1] ? __ia32_sys_getpeername+0xb0/0xb0 [ 3119.866872][ C1] ? _copy_to_user+0x126/0x160 [ 3119.871611][ C1] ? ns_to_timespec64+0xc0/0xc0 [ 3119.876434][ C1] ? lock_is_held_type+0xbb/0xf0 [ 3119.881430][ C1] ? lock_is_held_type+0xbb/0xf0 [ 3119.886341][ C1] ? syscall_enter_from_user_mode+0x20/0x290 [ 3119.892291][ C1] __x64_sys_sendto+0xdd/0x1b0 [ 3119.897037][ C1] ? syscall_enter_from_user_mode+0x20/0x290 [ 3119.902987][ C1] do_syscall_64+0x2d/0x70 [ 3119.907376][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3119.913240][ C1] RIP: 0033:0x45ce69 [ 3119.917108][ C1] Code: 2d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3119.936683][ C1] RSP: 002b:00007ff78bd21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3119.945063][ C1] RAX: ffffffffffffffda RBX: 000000000002c3c0 RCX: 000000000045ce69 [ 3119.953020][ C1] RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000003 [ 3119.960962][ C1] RBP: 000000000118bf78 R08: 000000002005ffe4 R09: 000000000000001c [ 3119.968928][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 3119.976884][ C1] R13: 00007ffc48eb5e9f R14: 00007ff78bd229c0 R15: 000000000118bf2c [ 3121.080077][ C1] Shutting down cpus with NMI [ 3121.087508][ C1] Kernel Offset: disabled [ 3121.092132][ C1] Rebooting in 86400 seconds..