[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.865730] audit: type=1800 audit(1541193148.917:25): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.884912] audit: type=1800 audit(1541193148.917:26): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.904390] audit: type=1800 audit(1541193148.937:27): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2018/11/02 21:12:42 fuzzer started 2018/11/02 21:12:48 dialing manager at 10.128.0.26:38635 2018/11/02 21:12:48 syscalls: 1 2018/11/02 21:12:48 code coverage: enabled 2018/11/02 21:12:48 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/02 21:12:48 setuid sandbox: enabled 2018/11/02 21:12:48 namespace sandbox: enabled 2018/11/02 21:12:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/02 21:12:48 fault injection: enabled 2018/11/02 21:12:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/02 21:12:48 net packed injection: enabled 2018/11/02 21:12:48 net device setup: enabled 21:15:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syzkaller login: [ 242.685780] IPVS: ftp: loaded support on port[0] = 21 [ 245.203538] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.210070] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.218906] device bridge_slave_0 entered promiscuous mode [ 245.364321] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.370800] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.379537] device bridge_slave_1 entered promiscuous mode [ 245.522705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 245.666792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 246.112254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 246.261769] bond0: Enslaving bond_slave_1 as an active interface with an up link 21:15:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0x200}, {}], 0x2) semop(r1, &(0x7f0000000300), 0x1b7) [ 246.593364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 246.600468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.160084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 247.168492] team0: Port device team_slave_0 added [ 247.294833] IPVS: ftp: loaded support on port[0] = 21 [ 247.462871] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 247.471025] team0: Port device team_slave_1 added [ 247.695595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 247.703016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.712348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.015867] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 248.023181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.032325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.264259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 248.272199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.281550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.461235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 248.469106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.478519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.893210] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.899733] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.908922] device bridge_slave_0 entered promiscuous mode [ 251.035165] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.041765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.048888] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.055531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.064586] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.095624] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.102318] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.111048] device bridge_slave_1 entered promiscuous mode [ 251.295311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.454998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.022551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.120112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.397238] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.660875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.668112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.909140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.916398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:15:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000001c0)={0x7b}) [ 253.576911] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.585183] team0: Port device team_slave_0 added [ 253.919560] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.927768] team0: Port device team_slave_1 added [ 254.316708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.323940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.332925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.450219] IPVS: ftp: loaded support on port[0] = 21 [ 254.676325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.683655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.692855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.033788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.041499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.050795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.289424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.297216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.306494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.407648] ip (6624) used greatest stack depth: 53184 bytes left [ 258.743404] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.749898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.757089] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.763649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.772750] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 259.103239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.815195] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.821756] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.830198] device bridge_slave_0 entered promiscuous mode [ 260.160866] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.167466] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.176207] device bridge_slave_1 entered promiscuous mode [ 260.464881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 260.751773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.792081] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.022562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.266726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 262.273903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.541859] 8021q: adding VLAN 0 to HW filter on device bond0 21:15:49 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x400c0930, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)}) [ 262.583618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 262.590642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.650532] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.658690] team0: Port device team_slave_0 added [ 263.718672] IPVS: ftp: loaded support on port[0] = 21 [ 263.930870] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 263.994283] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.002546] team0: Port device team_slave_1 added [ 264.352316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 264.359396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.368196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.731941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 264.739035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 264.747882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.068748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.076642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.085889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.404522] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 265.411007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.419236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.472342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.498603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.507782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.844485] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.623254] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.629733] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.638509] device bridge_slave_0 entered promiscuous mode [ 269.827711] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.834285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.841308] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.847922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.856902] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 270.019073] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.025803] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.034789] device bridge_slave_1 entered promiscuous mode [ 270.042307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.375051] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.728796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.127339] not chained 10000 origins [ 271.131205] CPU: 1 PID: 6944 Comm: ip Not tainted 4.19.0+ #77 [ 271.137094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.146477] Call Trace: [ 271.149092] dump_stack+0x32d/0x480 [ 271.152756] ? save_stack_trace+0xc6/0x110 [ 271.157027] kmsan_internal_chain_origin+0x222/0x240 [ 271.162152] ? br_port_fill_attrs+0x42b/0x1ea0 [ 271.166763] ? ___sys_recvmsg+0x444/0xae0 [ 271.170932] ? __se_sys_recvmsg+0x2fa/0x450 [ 271.175313] ? __x64_sys_recvmsg+0x4a/0x70 [ 271.179567] ? do_syscall_64+0xcf/0x110 [ 271.183560] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.188956] ? kmsan_internal_chain_origin+0x136/0x240 [ 271.194253] ? __msan_chain_origin+0x6d/0xd0 [ 271.198679] ? __save_stack_trace+0x8be/0xc60 [ 271.203195] ? save_stack_trace+0xc6/0x110 [ 271.207494] ? kmsan_internal_chain_origin+0x136/0x240 [ 271.212792] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 271.217488] ? __msan_memcpy+0x6f/0x80 [ 271.221408] ? nla_put+0x20a/0x2d0 [ 271.224975] ? br_port_fill_attrs+0x366/0x1ea0 [ 271.229575] ? br_port_fill_slave_info+0xff/0x120 [ 271.234436] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.238964] ? rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.243392] ? netlink_dump+0xb09/0x1750 [ 271.247509] ? netlink_recvmsg+0xec2/0x19d0 [ 271.251858] ? sock_recvmsg+0x1d1/0x230 [ 271.255880] ? ___sys_recvmsg+0x444/0xae0 [ 271.260083] ? __se_sys_recvmsg+0x2fa/0x450 [ 271.264426] ? __x64_sys_recvmsg+0x4a/0x70 [ 271.268692] ? do_syscall_64+0xcf/0x110 [ 271.272691] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.278095] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 271.283493] ? __module_address+0x6a/0x610 [ 271.287773] ? get_stack_info+0x863/0x9d0 [ 271.291993] __msan_chain_origin+0x6d/0xd0 [ 271.296268] ? __msan_memcpy+0x6f/0x80 [ 271.300178] __save_stack_trace+0x8be/0xc60 [ 271.304555] ? __msan_memcpy+0x6f/0x80 [ 271.308480] save_stack_trace+0xc6/0x110 [ 271.312569] kmsan_internal_chain_origin+0x136/0x240 [ 271.317721] ? kmsan_internal_chain_origin+0x136/0x240 [ 271.323019] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 271.327711] ? __msan_memcpy+0x6f/0x80 [ 271.331623] ? nla_put+0x20a/0x2d0 [ 271.335190] ? br_port_fill_attrs+0x366/0x1ea0 [ 271.339790] ? br_port_fill_slave_info+0xff/0x120 [ 271.344649] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.349161] ? rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.353600] ? netlink_dump+0xb09/0x1750 [ 271.357681] ? netlink_recvmsg+0xec2/0x19d0 [ 271.362072] ? sock_recvmsg+0x1d1/0x230 [ 271.366070] ? ___sys_recvmsg+0x444/0xae0 [ 271.370235] ? __se_sys_recvmsg+0x2fa/0x450 [ 271.374593] ? __x64_sys_recvmsg+0x4a/0x70 [ 271.378843] ? do_syscall_64+0xcf/0x110 [ 271.382841] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.388245] ? __msan_poison_alloca+0x1e0/0x2b0 [ 271.392977] ? kmsan_set_origin+0x83/0x130 [ 271.397257] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 271.402656] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.407222] __msan_memcpy+0x6f/0x80 [ 271.410969] nla_put+0x20a/0x2d0 [ 271.414378] br_port_fill_attrs+0x42b/0x1ea0 [ 271.418858] br_port_fill_slave_info+0xff/0x120 [ 271.423555] ? br_port_get_slave_size+0x30/0x30 [ 271.428252] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.432678] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.437060] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 271.442478] ? rtnl_getlink+0xde0/0xde0 [ 271.446494] netlink_dump+0xb09/0x1750 [ 271.450482] netlink_recvmsg+0xec2/0x19d0 [ 271.454703] sock_recvmsg+0x1d1/0x230 [ 271.458526] ? netlink_sendmsg+0x1440/0x1440 [ 271.462969] ___sys_recvmsg+0x444/0xae0 [ 271.467016] ? __msan_poison_alloca+0x1e0/0x2b0 [ 271.471729] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 271.477135] ? __fdget+0x23c/0x440 [ 271.480710] __se_sys_recvmsg+0x2fa/0x450 [ 271.484909] __x64_sys_recvmsg+0x4a/0x70 [ 271.489003] do_syscall_64+0xcf/0x110 [ 271.492834] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.498040] RIP: 0033:0x7ff86ed8c210 [ 271.501772] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 271.520693] RSP: 002b:00007ffefab88828 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 271.528429] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff86ed8c210 [ 271.535717] RDX: 0000000000000000 RSI: 00007ffefab88870 RDI: 0000000000000003 [ 271.543001] RBP: 0000000000001c28 R08: 00007ff86f035ec8 R09: 00007ff86edd2c00 [ 271.550284] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 271.557571] R13: 00007ffefab8c900 R14: 0000000000001c28 R15: 00007ffefab8a4d8 [ 271.564887] Uninit was stored to memory at: [ 271.569246] kmsan_internal_chain_origin+0x136/0x240 [ 271.574424] __msan_chain_origin+0x6d/0xd0 [ 271.578724] __save_stack_trace+0x8be/0xc60 [ 271.583060] save_stack_trace+0xc6/0x110 [ 271.587145] kmsan_internal_chain_origin+0x136/0x240 [ 271.592302] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.596818] __msan_memcpy+0x6f/0x80 [ 271.600554] nla_put+0x20a/0x2d0 [ 271.603941] br_port_fill_attrs+0x366/0x1ea0 [ 271.608405] br_port_fill_slave_info+0xff/0x120 [ 271.613096] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.617437] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.621690] netlink_dump+0xb09/0x1750 [ 271.625592] netlink_recvmsg+0xec2/0x19d0 [ 271.629800] sock_recvmsg+0x1d1/0x230 [ 271.633613] ___sys_recvmsg+0x444/0xae0 [ 271.637614] __se_sys_recvmsg+0x2fa/0x450 [ 271.641774] __x64_sys_recvmsg+0x4a/0x70 [ 271.645852] do_syscall_64+0xcf/0x110 [ 271.649669] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.654861] [ 271.656499] Uninit was stored to memory at: [ 271.660842] kmsan_internal_chain_origin+0x136/0x240 [ 271.665977] __msan_chain_origin+0x6d/0xd0 [ 271.670235] __save_stack_trace+0x8be/0xc60 [ 271.674578] save_stack_trace+0xc6/0x110 [ 271.678666] kmsan_internal_chain_origin+0x136/0x240 [ 271.684308] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.688824] __msan_memcpy+0x6f/0x80 [ 271.692558] nla_put+0x20a/0x2d0 [ 271.695942] br_port_fill_attrs+0x366/0x1ea0 [ 271.700380] br_port_fill_slave_info+0xff/0x120 [ 271.705070] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.709410] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.713680] netlink_dump+0xb09/0x1750 [ 271.717588] netlink_recvmsg+0xec2/0x19d0 [ 271.721754] sock_recvmsg+0x1d1/0x230 [ 271.725600] ___sys_recvmsg+0x444/0xae0 [ 271.729591] __se_sys_recvmsg+0x2fa/0x450 [ 271.733766] __x64_sys_recvmsg+0x4a/0x70 [ 271.737843] do_syscall_64+0xcf/0x110 [ 271.741661] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.746855] [ 271.748510] Uninit was stored to memory at: [ 271.752856] kmsan_internal_chain_origin+0x136/0x240 [ 271.757991] __msan_chain_origin+0x6d/0xd0 [ 271.762290] __save_stack_trace+0x8be/0xc60 [ 271.766627] save_stack_trace+0xc6/0x110 [ 271.770706] kmsan_internal_chain_origin+0x136/0x240 [ 271.775830] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.780362] __msan_memcpy+0x6f/0x80 [ 271.784092] nla_put+0x20a/0x2d0 [ 271.787490] br_port_fill_attrs+0x366/0x1ea0 [ 271.791916] br_port_fill_slave_info+0xff/0x120 [ 271.796612] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.800959] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.805228] netlink_dump+0xb09/0x1750 [ 271.809147] netlink_recvmsg+0xec2/0x19d0 [ 271.813320] sock_recvmsg+0x1d1/0x230 [ 271.817142] ___sys_recvmsg+0x444/0xae0 [ 271.821147] __se_sys_recvmsg+0x2fa/0x450 [ 271.825329] __x64_sys_recvmsg+0x4a/0x70 [ 271.829407] do_syscall_64+0xcf/0x110 [ 271.833244] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.838475] [ 271.840108] Uninit was stored to memory at: [ 271.844453] kmsan_internal_chain_origin+0x136/0x240 [ 271.849604] __msan_chain_origin+0x6d/0xd0 [ 271.853864] __save_stack_trace+0x8be/0xc60 [ 271.858208] save_stack_trace+0xc6/0x110 [ 271.862293] kmsan_internal_chain_origin+0x136/0x240 [ 271.867412] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.871927] __msan_memcpy+0x6f/0x80 [ 271.875673] nla_put+0x20a/0x2d0 [ 271.879065] br_port_fill_attrs+0x366/0x1ea0 [ 271.883511] br_port_fill_slave_info+0xff/0x120 [ 271.888195] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.892533] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.896783] netlink_dump+0xb09/0x1750 [ 271.900700] netlink_recvmsg+0xec2/0x19d0 [ 271.904869] sock_recvmsg+0x1d1/0x230 [ 271.908689] ___sys_recvmsg+0x444/0xae0 [ 271.912684] __se_sys_recvmsg+0x2fa/0x450 [ 271.916853] __x64_sys_recvmsg+0x4a/0x70 [ 271.920936] do_syscall_64+0xcf/0x110 [ 271.924798] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 271.929999] [ 271.931635] Uninit was stored to memory at: [ 271.935983] kmsan_internal_chain_origin+0x136/0x240 [ 271.941107] __msan_chain_origin+0x6d/0xd0 [ 271.945359] __save_stack_trace+0x8be/0xc60 [ 271.949701] save_stack_trace+0xc6/0x110 [ 271.953787] kmsan_internal_chain_origin+0x136/0x240 [ 271.958921] kmsan_memcpy_origins+0x13d/0x1b0 [ 271.963441] __msan_memcpy+0x6f/0x80 [ 271.967176] nla_put+0x20a/0x2d0 [ 271.970560] br_port_fill_attrs+0x366/0x1ea0 [ 271.975005] br_port_fill_slave_info+0xff/0x120 [ 271.979690] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 271.984029] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 271.988281] netlink_dump+0xb09/0x1750 [ 271.992186] netlink_recvmsg+0xec2/0x19d0 [ 271.996352] sock_recvmsg+0x1d1/0x230 [ 272.000184] ___sys_recvmsg+0x444/0xae0 [ 272.004179] __se_sys_recvmsg+0x2fa/0x450 [ 272.008346] __x64_sys_recvmsg+0x4a/0x70 [ 272.012491] do_syscall_64+0xcf/0x110 [ 272.016321] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.021516] [ 272.023155] Uninit was stored to memory at: [ 272.027550] kmsan_internal_chain_origin+0x136/0x240 [ 272.032686] __msan_chain_origin+0x6d/0xd0 [ 272.036941] __save_stack_trace+0x8be/0xc60 [ 272.041323] save_stack_trace+0xc6/0x110 [ 272.045402] kmsan_internal_chain_origin+0x136/0x240 [ 272.050524] kmsan_memcpy_origins+0x13d/0x1b0 [ 272.055077] __msan_memcpy+0x6f/0x80 [ 272.058806] nla_put+0x20a/0x2d0 [ 272.062191] br_port_fill_attrs+0x366/0x1ea0 [ 272.066623] br_port_fill_slave_info+0xff/0x120 [ 272.071308] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 272.075649] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 272.079899] netlink_dump+0xb09/0x1750 [ 272.083803] netlink_recvmsg+0xec2/0x19d0 [ 272.087978] sock_recvmsg+0x1d1/0x230 [ 272.091799] ___sys_recvmsg+0x444/0xae0 [ 272.095794] __se_sys_recvmsg+0x2fa/0x450 [ 272.099966] __x64_sys_recvmsg+0x4a/0x70 [ 272.104051] do_syscall_64+0xcf/0x110 [ 272.107874] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.113066] [ 272.114700] Uninit was stored to memory at: [ 272.119044] kmsan_internal_chain_origin+0x136/0x240 [ 272.124165] __msan_chain_origin+0x6d/0xd0 [ 272.128422] __save_stack_trace+0x8be/0xc60 [ 272.132772] save_stack_trace+0xc6/0x110 [ 272.136857] kmsan_internal_chain_origin+0x136/0x240 [ 272.141991] kmsan_memcpy_origins+0x13d/0x1b0 [ 272.146507] __msan_memcpy+0x6f/0x80 [ 272.150244] nla_put+0x20a/0x2d0 [ 272.153633] br_port_fill_attrs+0x366/0x1ea0 [ 272.158062] br_port_fill_slave_info+0xff/0x120 [ 272.162754] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 272.167103] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 272.171355] netlink_dump+0xb09/0x1750 [ 272.175263] netlink_recvmsg+0xec2/0x19d0 [ 272.179430] sock_recvmsg+0x1d1/0x230 [ 272.183251] ___sys_recvmsg+0x444/0xae0 [ 272.187244] __se_sys_recvmsg+0x2fa/0x450 [ 272.191412] __x64_sys_recvmsg+0x4a/0x70 [ 272.195496] do_syscall_64+0xcf/0x110 [ 272.199314] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 272.204507] [ 272.206147] Local variable description: ----c.i.i@should_fail [ 272.212033] Variable was created at: [ 272.215763] should_fail+0x162/0x13c0 [ 272.219586] __alloc_pages_nodemask+0x6fd/0x6640 [ 272.878759] bond0: Enslaving bond_slave_0 as an active interface with an up link 21:16:00 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x929, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)}) [ 273.233600] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 273.460549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.636344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 273.643628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.064739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 274.072437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.509842] IPVS: ftp: loaded support on port[0] = 21 [ 275.129431] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.453451] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.461473] team0: Port device team_slave_0 added [ 275.925296] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 275.933654] team0: Port device team_slave_1 added [ 276.360468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 276.368102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.377291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.666886] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 276.673424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.681864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.848509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 276.855779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.864842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.330825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 277.338729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.347880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.844403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.852236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.861441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.328016] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.368774] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.376018] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.431227] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.437867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.445157] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.451736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.458742] device bridge0 entered promiscuous mode [ 279.465231] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.579099] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.585847] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.593006] device bridge0 left promiscuous mode [ 279.654094] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.660664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.667818] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.674378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.682000] device bridge0 entered promiscuous mode [ 279.688370] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 280.373487] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.380168] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.387119] device bridge0 left promiscuous mode [ 280.434067] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.440571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.447775] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.454384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.461926] device bridge0 entered promiscuous mode [ 280.468469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 281.222305] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.229107] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.235917] device bridge0 left promiscuous mode [ 281.314214] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.320814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.327981] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.334573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.341716] device bridge0 entered promiscuous mode [ 281.348067] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 281.432245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:16:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 281.802543] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.809017] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.817864] device bridge_slave_0 entered promiscuous mode [ 281.986030] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.992817] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.999538] device bridge0 left promiscuous mode [ 282.043280] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.049866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.057041] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.063629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.070681] device bridge0 entered promiscuous mode [ 282.178817] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.185430] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.194236] device bridge_slave_1 entered promiscuous mode 21:16:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 282.679474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 283.046762] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.053325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.060375] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.067007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.075807] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 283.100225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 21:16:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 283.452916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:16:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 284.668466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 285.074744] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 285.466257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 285.473700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.879893] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 285.887170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 287.026276] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 287.034453] team0: Port device team_slave_0 added [ 287.265875] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 287.274284] team0: Port device team_slave_1 added [ 287.521872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 287.541124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 287.550099] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.794931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 287.803363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.812369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.078898] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 288.086757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.096047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.122107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.283395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 288.291058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.300416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 21:16:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000740)=""/4096, 0x1000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 288.553016] hrtimer: interrupt took 58873 ns [ 289.290270] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.081283] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.087730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.095892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.548379] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.555172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.562337] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.568823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.577579] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 291.044581] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.093991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.571073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.453388] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 296.032026] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 21:16:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) [ 296.495036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 296.501437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.509700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.258373] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.909138] not chained 20000 origins [ 297.913008] CPU: 0 PID: 7595 Comm: ip Not tainted 4.19.0+ #77 [ 297.918904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.928282] Call Trace: [ 297.930892] dump_stack+0x32d/0x480 [ 297.934566] ? save_stack_trace+0xc6/0x110 [ 297.938832] kmsan_internal_chain_origin+0x222/0x240 [ 297.943970] ? br_port_fill_attrs+0x42b/0x1ea0 [ 297.948580] ? ___sys_recvmsg+0x444/0xae0 [ 297.952748] ? __se_sys_recvmsg+0x2fa/0x450 [ 297.957094] ? __x64_sys_recvmsg+0x4a/0x70 [ 297.961349] ? do_syscall_64+0xcf/0x110 [ 297.965343] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.970723] ? do_syscall_64+0xcf/0x110 [ 297.974707] ? kmsan_internal_chain_origin+0x136/0x240 [ 297.979975] ? __msan_chain_origin+0x6d/0xd0 [ 297.984379] ? __save_stack_trace+0x8be/0xc60 [ 297.988868] ? save_stack_trace+0xc6/0x110 [ 297.993097] ? kmsan_internal_chain_origin+0x136/0x240 [ 297.998364] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 298.003028] ? __msan_memcpy+0x6f/0x80 [ 298.006910] ? nla_put+0x20a/0x2d0 [ 298.010451] ? br_port_fill_attrs+0x366/0x1ea0 [ 298.015027] ? br_port_fill_slave_info+0xff/0x120 [ 298.019860] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.024365] ? rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.028792] ? netlink_dump+0xb09/0x1750 [ 298.032873] ? netlink_recvmsg+0xec2/0x19d0 [ 298.037220] ? sock_recvmsg+0x1d1/0x230 [ 298.041207] ? ___sys_recvmsg+0x444/0xae0 [ 298.045361] ? __se_sys_recvmsg+0x2fa/0x450 [ 298.049675] ? __x64_sys_recvmsg+0x4a/0x70 [ 298.053904] ? do_syscall_64+0xcf/0x110 [ 298.057879] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.063245] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 298.068603] ? __module_address+0x6a/0x610 [ 298.072846] ? get_stack_info+0x863/0x9d0 [ 298.077016] __msan_chain_origin+0x6d/0xd0 [ 298.081248] ? netlink_dump+0xb09/0x1750 [ 298.085306] __save_stack_trace+0x8be/0xc60 [ 298.089657] ? netlink_dump+0xb09/0x1750 [ 298.093717] save_stack_trace+0xc6/0x110 [ 298.097776] kmsan_internal_chain_origin+0x136/0x240 [ 298.102884] ? kmsan_internal_chain_origin+0x136/0x240 [ 298.108152] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 298.112814] ? __msan_memcpy+0x6f/0x80 [ 298.116697] ? nla_put+0x20a/0x2d0 [ 298.120231] ? br_port_fill_attrs+0x42b/0x1ea0 [ 298.124825] ? br_port_fill_slave_info+0xff/0x120 [ 298.129664] ? rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.134156] ? rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.138554] ? netlink_dump+0xb09/0x1750 [ 298.142637] ? netlink_recvmsg+0xec2/0x19d0 [ 298.146972] ? sock_recvmsg+0x1d1/0x230 [ 298.150945] ? ___sys_recvmsg+0x444/0xae0 [ 298.155084] ? __se_sys_recvmsg+0x2fa/0x450 [ 298.159395] ? __x64_sys_recvmsg+0x4a/0x70 [ 298.163623] ? do_syscall_64+0xcf/0x110 [ 298.167589] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.172963] ? __msan_poison_alloca+0x1e0/0x2b0 [ 298.177645] ? kmsan_set_origin+0x83/0x130 [ 298.181879] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 298.187246] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.191743] __msan_memcpy+0x6f/0x80 [ 298.195455] nla_put+0x20a/0x2d0 [ 298.198825] br_port_fill_attrs+0x42b/0x1ea0 [ 298.203239] br_port_fill_slave_info+0xff/0x120 [ 298.207904] ? br_port_get_slave_size+0x30/0x30 [ 298.212575] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.216924] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.221267] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 298.226630] ? rtnl_getlink+0xde0/0xde0 [ 298.230596] netlink_dump+0xb09/0x1750 [ 298.234494] netlink_recvmsg+0xec2/0x19d0 [ 298.238657] sock_recvmsg+0x1d1/0x230 [ 298.242457] ? netlink_sendmsg+0x1440/0x1440 [ 298.246865] ___sys_recvmsg+0x444/0xae0 [ 298.250851] ? __msan_poison_alloca+0x1e0/0x2b0 [ 298.255530] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 298.260886] ? __fdget+0x23c/0x440 [ 298.264427] __se_sys_recvmsg+0x2fa/0x450 [ 298.268585] __x64_sys_recvmsg+0x4a/0x70 [ 298.272644] do_syscall_64+0xcf/0x110 [ 298.276442] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.281634] RIP: 0033:0x7f90faadd210 [ 298.285356] Code: 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 90 83 3d e5 d3 2a 00 00 75 10 b8 2f 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e bb 00 00 48 89 04 24 [ 298.304250] RSP: 002b:00007ffe35337ff8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 298.311966] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f90faadd210 [ 298.319227] RDX: 0000000000000000 RSI: 00007ffe35338040 RDI: 0000000000000003 [ 298.326487] RBP: 0000000000001c28 R08: 00007f90fad86ec8 R09: 00007f90fab23c00 [ 298.333777] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006395c0 [ 298.341040] R13: 00007ffe3533c0d0 R14: 0000000000001c28 R15: 00007ffe35339ca8 [ 298.348315] Uninit was stored to memory at: [ 298.352636] kmsan_internal_chain_origin+0x136/0x240 [ 298.357731] __msan_chain_origin+0x6d/0xd0 [ 298.361984] __save_stack_trace+0x8be/0xc60 [ 298.366307] save_stack_trace+0xc6/0x110 [ 298.370373] kmsan_internal_chain_origin+0x136/0x240 [ 298.375469] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.379966] __msan_memcpy+0x6f/0x80 [ 298.383674] nla_put+0x20a/0x2d0 [ 298.387033] br_port_fill_attrs+0x366/0x1ea0 [ 298.391431] br_port_fill_slave_info+0xff/0x120 [ 298.396097] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.400406] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.404631] netlink_dump+0xb09/0x1750 [ 298.408509] netlink_recvmsg+0xec2/0x19d0 [ 298.412651] sock_recvmsg+0x1d1/0x230 [ 298.416440] ___sys_recvmsg+0x444/0xae0 [ 298.420405] __se_sys_recvmsg+0x2fa/0x450 [ 298.424578] __x64_sys_recvmsg+0x4a/0x70 [ 298.428631] do_syscall_64+0xcf/0x110 [ 298.432425] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.437603] [ 298.439215] Uninit was stored to memory at: [ 298.443533] kmsan_internal_chain_origin+0x136/0x240 [ 298.448644] __msan_chain_origin+0x6d/0xd0 [ 298.452887] __save_stack_trace+0x8be/0xc60 [ 298.457199] save_stack_trace+0xc6/0x110 [ 298.461249] kmsan_internal_chain_origin+0x136/0x240 [ 298.466346] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.470832] __msan_memcpy+0x6f/0x80 [ 298.474536] nla_put+0x20a/0x2d0 [ 298.477893] br_port_fill_attrs+0x366/0x1ea0 [ 298.482294] br_port_fill_slave_info+0xff/0x120 [ 298.487003] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.491344] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.495571] netlink_dump+0xb09/0x1750 [ 298.499448] netlink_recvmsg+0xec2/0x19d0 [ 298.503596] sock_recvmsg+0x1d1/0x230 [ 298.507387] ___sys_recvmsg+0x444/0xae0 [ 298.511350] __se_sys_recvmsg+0x2fa/0x450 [ 298.515488] __x64_sys_recvmsg+0x4a/0x70 [ 298.519541] do_syscall_64+0xcf/0x110 [ 298.523335] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.528506] [ 298.530118] Uninit was stored to memory at: [ 298.534432] kmsan_internal_chain_origin+0x136/0x240 [ 298.539528] __msan_chain_origin+0x6d/0xd0 [ 298.543754] __save_stack_trace+0x8be/0xc60 [ 298.548084] save_stack_trace+0xc6/0x110 [ 298.552139] kmsan_internal_chain_origin+0x136/0x240 [ 298.557236] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.561736] __msan_memcpy+0x6f/0x80 [ 298.565463] nla_put+0x20a/0x2d0 [ 298.569027] br_port_fill_attrs+0x366/0x1ea0 [ 298.573429] br_port_fill_slave_info+0xff/0x120 [ 298.578099] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.582412] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.586636] netlink_dump+0xb09/0x1750 [ 298.590511] netlink_recvmsg+0xec2/0x19d0 [ 298.594654] sock_recvmsg+0x1d1/0x230 [ 298.598443] ___sys_recvmsg+0x444/0xae0 [ 298.602411] __se_sys_recvmsg+0x2fa/0x450 [ 298.606547] __x64_sys_recvmsg+0x4a/0x70 [ 298.610598] do_syscall_64+0xcf/0x110 [ 298.614394] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.619585] [ 298.621205] Uninit was stored to memory at: [ 298.625527] kmsan_internal_chain_origin+0x136/0x240 [ 298.630621] __msan_chain_origin+0x6d/0xd0 [ 298.634851] __save_stack_trace+0x8be/0xc60 [ 298.639179] save_stack_trace+0xc6/0x110 [ 298.643233] kmsan_internal_chain_origin+0x136/0x240 [ 298.648327] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.652816] __msan_memcpy+0x6f/0x80 [ 298.656518] nla_put+0x20a/0x2d0 [ 298.659876] br_port_fill_attrs+0x366/0x1ea0 [ 298.664280] br_port_fill_slave_info+0xff/0x120 [ 298.668949] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.673264] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.677491] netlink_dump+0xb09/0x1750 [ 298.681369] netlink_recvmsg+0xec2/0x19d0 [ 298.685712] sock_recvmsg+0x1d1/0x230 [ 298.689505] ___sys_recvmsg+0x444/0xae0 [ 298.693473] __se_sys_recvmsg+0x2fa/0x450 [ 298.697634] __x64_sys_recvmsg+0x4a/0x70 [ 298.701708] do_syscall_64+0xcf/0x110 [ 298.705518] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.710689] [ 298.712299] Uninit was stored to memory at: [ 298.716615] kmsan_internal_chain_origin+0x136/0x240 [ 298.721726] __msan_chain_origin+0x6d/0xd0 [ 298.725970] __save_stack_trace+0x8be/0xc60 [ 298.730283] save_stack_trace+0xc6/0x110 [ 298.734337] kmsan_internal_chain_origin+0x136/0x240 [ 298.739431] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.743919] __msan_memcpy+0x6f/0x80 [ 298.747648] nla_put+0x20a/0x2d0 [ 298.751006] br_port_fill_attrs+0x366/0x1ea0 [ 298.755406] br_port_fill_slave_info+0xff/0x120 [ 298.760065] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.764376] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.768599] netlink_dump+0xb09/0x1750 [ 298.772510] netlink_recvmsg+0xec2/0x19d0 [ 298.776647] sock_recvmsg+0x1d1/0x230 [ 298.780438] ___sys_recvmsg+0x444/0xae0 [ 298.784407] __se_sys_recvmsg+0x2fa/0x450 [ 298.788560] __x64_sys_recvmsg+0x4a/0x70 [ 298.792631] do_syscall_64+0xcf/0x110 [ 298.796442] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.801630] [ 298.803259] Uninit was stored to memory at: [ 298.807574] kmsan_internal_chain_origin+0x136/0x240 [ 298.812667] __msan_chain_origin+0x6d/0xd0 [ 298.816892] __save_stack_trace+0x8be/0xc60 [ 298.821202] save_stack_trace+0xc6/0x110 [ 298.825274] kmsan_internal_chain_origin+0x136/0x240 [ 298.830383] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.834871] __msan_memcpy+0x6f/0x80 [ 298.838573] nla_put+0x20a/0x2d0 [ 298.841939] br_port_fill_attrs+0x366/0x1ea0 [ 298.846345] br_port_fill_slave_info+0xff/0x120 [ 298.851005] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.855347] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.859570] netlink_dump+0xb09/0x1750 [ 298.863448] netlink_recvmsg+0xec2/0x19d0 [ 298.867590] sock_recvmsg+0x1d1/0x230 [ 298.871408] ___sys_recvmsg+0x444/0xae0 [ 298.875387] __se_sys_recvmsg+0x2fa/0x450 [ 298.879552] __x64_sys_recvmsg+0x4a/0x70 [ 298.883650] do_syscall_64+0xcf/0x110 [ 298.887473] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.892647] [ 298.894296] Uninit was stored to memory at: [ 298.898611] kmsan_internal_chain_origin+0x136/0x240 [ 298.903707] __msan_chain_origin+0x6d/0xd0 [ 298.907928] __save_stack_trace+0x8be/0xc60 [ 298.912254] save_stack_trace+0xc6/0x110 [ 298.916320] kmsan_internal_chain_origin+0x136/0x240 [ 298.921410] kmsan_memcpy_origins+0x13d/0x1b0 [ 298.925898] __msan_memcpy+0x6f/0x80 [ 298.929600] nla_put+0x20a/0x2d0 [ 298.932965] br_port_fill_attrs+0x366/0x1ea0 [ 298.937364] br_port_fill_slave_info+0xff/0x120 [ 298.942022] rtnl_fill_ifinfo+0x5b6e/0x6d80 [ 298.946334] rtnl_dump_ifinfo+0xbe5/0x19b0 [ 298.950554] netlink_dump+0xb09/0x1750 [ 298.954475] netlink_recvmsg+0xec2/0x19d0 [ 298.958625] sock_recvmsg+0x1d1/0x230 [ 298.962415] ___sys_recvmsg+0x444/0xae0 [ 298.966379] __se_sys_recvmsg+0x2fa/0x450 [ 298.970514] __x64_sys_recvmsg+0x4a/0x70 [ 298.974565] do_syscall_64+0xcf/0x110 [ 298.978354] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.983540] [ 298.985169] Local variable description: ----c.i.i@should_fail [ 298.991036] Variable was created at: [ 298.994740] should_fail+0x162/0x13c0 [ 298.998530] __alloc_pages_nodemask+0x6fd/0x6640 [ 299.991812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.538129] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 301.099632] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 301.106312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.114306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.662585] 8021q: adding VLAN 0 to HW filter on device team0 21:16:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000980)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 21:16:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000840)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, &(0x7f0000000800)}, 0x890) 21:16:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:30 executing program 1: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f0000000e40), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1000000001000000250000008241d807475150425da3aabae7e345ea1d46df1c6f0f3f94bd18aab43ddffc8a58159a68e0f7b40851200000000000000020edf8a2cc65fee8fc53ed6a9866d41d04fb65d3cd3f1fbb19dd36bced871e00"], 0x5d}}], 0x1, 0x0) 21:16:30 executing program 2: unshare(0x24000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') setns(r0, 0x0) 21:16:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000900000000000000000800819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001640)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000001780)=ANY=[@ANYBLOB, @ANYRES16=0x0], 0x2}}, 0x0) [ 304.001709] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:16:31 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="90fd1b8233d2e2dcd76ad8a3cc7a3c02fcdf77ebc2842a3bcaed4b14cf870cc11793949e4ba6458fc03ed75e7d"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 21:16:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000840)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, &(0x7f0000000800)}, 0x890) 21:16:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(r1, r2, &(0x7f0000000080), 0x1) [ 304.516863] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.523741] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.530394] device bridge0 left promiscuous mode 21:16:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 21:16:31 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0), 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) read(0xffffffffffffffff, &(0x7f0000000080)=""/19, 0xffffff5c) [ 304.644893] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.651595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.658743] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.665290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.672491] device bridge0 entered promiscuous mode [ 304.679385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:32 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(r1, r2, &(0x7f0000000080), 0x1) 21:16:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(r1, r2, &(0x7f0000000080), 0x1) [ 305.285325] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.292304] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.298942] device bridge0 left promiscuous mode [ 305.376699] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.383350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.390335] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.396993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.404149] device bridge0 entered promiscuous mode [ 305.410721] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 305.542578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.573038] IPVS: ftp: loaded support on port[0] = 21 [ 307.238277] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.244820] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.253167] device bridge_slave_0 entered promiscuous mode [ 307.333166] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.339586] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.347765] device bridge_slave_1 entered promiscuous mode [ 307.426062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 307.505040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 307.851797] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 307.937327] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 308.017023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 308.024064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 308.105066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 308.112148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 308.350783] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 308.358541] team0: Port device team_slave_0 added [ 308.435858] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 308.443489] team0: Port device team_slave_1 added [ 308.522192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.602584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.684819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 308.692421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.701432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.783163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 308.790496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.799700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.683274] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.689724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.696849] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.703544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.712325] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 309.882014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 312.914533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.210497] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 313.506299] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 313.512667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.520318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.823830] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.757693] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.764697] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.777070] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.783608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.790407] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.797106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.804042] device bridge0 entered promiscuous mode [ 315.810123] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="90fd1b8233d2e2dcd76ad8a3cc7a3c02fcdf77ebc2842a3bcaed4b14cf870cc11793949e4ba6458fc03ed75e7d"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 21:16:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0)=0x2002, 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020b0001020000000000600000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d36473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 21:16:42 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(r1, r2, &(0x7f0000000080), 0x1) 21:16:42 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x20002, 0x0) epoll_create(0x31) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) [ 315.952140] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.958894] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.965812] device bridge0 left promiscuous mode [ 316.013954] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.020647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.027804] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.034406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.041522] device bridge0 entered promiscuous mode [ 316.048246] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 316.056527] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.063411] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.070171] device bridge0 left promiscuous mode [ 316.100051] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.106886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.114072] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.120561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.127981] device bridge0 entered promiscuous mode 21:16:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)) 21:16:43 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:43 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') preadv(r0, &(0x7f0000000480), 0x200000000000028e, 0x5d) [ 316.533671] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.540463] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.547384] device bridge0 left promiscuous mode [ 316.627579] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.635540] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.642434] device bridge0 left promiscuous mode [ 316.687361] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.694103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.701151] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.707839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.715186] device bridge0 entered promiscuous mode [ 316.721960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x20010, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}}, 0x0) [ 316.782081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.792456] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.798966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.806176] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.812790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.819757] device bridge0 entered promiscuous mode [ 316.826604] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local={0xac, 0x223}}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f0000000080)) 21:16:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(r1, r2, &(0x7f0000000080), 0x1) 21:16:44 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x20002, 0x0) epoll_create(0x31) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) 21:16:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x0) 21:16:44 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000180)) 21:16:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) [ 317.622880] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.629666] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.636546] device bridge0 left promiscuous mode [ 317.653579] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.660331] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.667213] device bridge0 left promiscuous mode [ 317.711145] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.717941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.725110] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.731743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.738795] device bridge0 entered promiscuous mode [ 317.745452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 317.792055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:16:45 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x1}) [ 318.188479] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.195529] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.202417] device bridge0 left promiscuous mode 21:16:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) read(0xffffffffffffffff, &(0x7f0000000080)=""/19, 0xffffff5c) [ 318.275372] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.282061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.289126] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.295748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.302959] device bridge0 entered promiscuous mode 21:16:45 executing program 4: r0 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) 21:16:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:45 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') exit(0x1) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000080), 0x1) 21:16:45 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000000)) [ 318.993062] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.999744] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.006637] device bridge0 left promiscuous mode [ 319.047975] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.054542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.061536] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.068171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.075839] device bridge0 entered promiscuous mode 21:16:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:46 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:46 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:46 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:46 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0xffffffffffffffe4) [ 319.785420] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.792289] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.799089] device bridge0 left promiscuous mode [ 319.925130] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.931786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.938834] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.945493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.952638] device bridge0 entered promiscuous mode [ 319.959092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:47 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:47 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:47 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0xffffffffffffffe4) 21:16:47 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 320.619691] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.626620] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.633567] device bridge0 left promiscuous mode 21:16:47 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:47 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:47 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:47 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285798070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002700000000000000000000000000"], 0x1) [ 320.749280] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.755993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.763148] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.769608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.777278] device bridge0 entered promiscuous mode [ 320.783827] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 320.871977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:16:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:48 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:48 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:48 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x1, 0x1}) [ 321.353817] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.360526] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.367519] device bridge0 left promiscuous mode [ 321.540552] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.547371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.554770] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.561253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.568762] device bridge0 entered promiscuous mode 21:16:48 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:48 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:48 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x800) read(r0, &(0x7f0000000140)=""/28, 0x1c) 21:16:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x1) 21:16:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:49 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:49 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 322.337583] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.344449] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.351813] device bridge0 left promiscuous mode 21:16:49 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)) umount2(&(0x7f0000000200)='./file0\x00', 0x4) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhci\x00', 0x8000, 0x0) dup3(r1, r0, 0x80000) 21:16:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 322.479965] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.486644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.493807] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.500285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.507562] device bridge0 entered promiscuous mode 21:16:49 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:49 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:49 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)) umount2(&(0x7f0000000200)='./file0\x00', 0x4) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhci\x00', 0x8000, 0x0) dup3(r1, r0, 0x80000) [ 323.235874] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.242792] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.249671] device bridge0 left promiscuous mode 21:16:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_destroy(0x0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x1) 21:16:50 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:50 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 323.365961] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.372540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.379543] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.386162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.393335] device bridge0 entered promiscuous mode 21:16:50 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x16, &(0x7f0000000180)={@local, @remote, [], {@llc_tr={0x11, {@snap={0x0, 0x0, "a5", "4278a0"}}}}}, &(0x7f0000000040)) 21:16:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:50 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:50 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 324.097094] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.104010] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.110873] device bridge0 left promiscuous mode 21:16:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x103}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000001f00)={&(0x7f0000001780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001800)=""/55, 0x37}, {&(0x7f0000001a40)=""/129, 0x81}, {&(0x7f0000001b00)=""/83, 0x53}, {&(0x7f0000001b80)=""/230, 0xe6}, {&(0x7f0000001c80)=""/105, 0x69}, {&(0x7f0000001d00)=""/196, 0xc4}], 0x6, &(0x7f0000001ec0), 0x0, 0x9}, 0x20) close(r2) [ 324.208017] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.214633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.221977] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.228499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.235836] device bridge0 entered promiscuous mode 21:16:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:51 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:51 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:51 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:52 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 324.936740] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.943615] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.950360] device bridge0 left promiscuous mode [ 325.018690] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.025303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.032429] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.038895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.046137] device bridge0 entered promiscuous mode [ 325.052541] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:52 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:52 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:52 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x100000118) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfdff}, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18}, 0x18) 21:16:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) [ 325.751327] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.758165] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.765133] device bridge0 left promiscuous mode 21:16:52 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:52 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 325.869371] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.876048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.883210] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.889813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.897253] device bridge0 entered promiscuous mode [ 325.903827] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 325.992187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:16:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:53 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 326.372452] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.379286] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.386099] device bridge0 left promiscuous mode [ 326.403008] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.409646] bridge0: port 2(bridge_slave_1) entered forwarding state 21:16:53 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 326.416760] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.423324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.430474] device bridge0 entered promiscuous mode 21:16:53 executing program 1: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) 21:16:54 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 327.005015] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.011979] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.018809] device bridge0 left promiscuous mode [ 327.047520] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.054282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.061353] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.067997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.075462] device bridge0 entered promiscuous mode 21:16:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:54 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:54 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\x00\x00\x00\x00'], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 327.581846] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.588524] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.595307] device bridge0 left promiscuous mode 21:16:54 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 327.709367] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.716065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.723196] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.729657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.736762] device bridge0 entered promiscuous mode 21:16:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:55 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) [ 328.369808] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.376776] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.383687] device bridge0 left promiscuous mode 21:16:55 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:55 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) [ 328.482481] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.489037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.496226] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.502793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.509985] device bridge0 entered promiscuous mode 21:16:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:55 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={"62723000000000000000eaffffff00", &(0x7f0000000440)=@ethtool_rxnfc={0x0, 0x0, 0x0, {0x0, @sctp_ip4_spec={@loopback, @dev}, {')>', @broadcast}, @ether_spec={@random="2e761d1735fe", @dev}, {"f1d9", @dev}}}}) 21:16:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:56 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:56 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) [ 329.195654] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.202464] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.209369] device bridge0 left promiscuous mode [ 329.271359] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.277988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.285126] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.291691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.298661] device bridge0 entered promiscuous mode 21:16:56 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ifb0\x00'}) 21:16:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d024031628571") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:56 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:56 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) [ 329.910090] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.916958] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.923889] device bridge0 left promiscuous mode [ 329.973061] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.979668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.986788] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.993339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.000485] device bridge0 entered promiscuous mode 21:16:57 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) getrandom(&(0x7f0000000040)=""/44, 0xffffff7b, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) 21:16:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:57 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:57 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) [ 330.557536] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.564351] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.571108] device bridge0 left promiscuous mode 21:16:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 330.644802] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.651264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.658421] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.665024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.672255] device bridge0 entered promiscuous mode 21:16:57 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f00000005c0)="09d5f11eba0402466fb4d49f9a91b550626537054ac0c2962a914c6f15076b8ff6d5887e7a57b3636dea1a7fea4ad39772035cd5fd4bb572d38e5c47d3acf621cbce20d4556feaf63f96b65aee9f760726f41d0a2829695c2e21c535f1d15c896218f6f5cd95784ce9a176b00638c74a64d8f82c2841f736d2a5cb5d48e2cdb05d067a20bacc96ca6bcb542337c2bf63c8c158e3b8ea95a6db83821e", 0x9c}], 0x1, 0x3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0x40a85321, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000000000000e00"}) 21:16:57 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 331.214522] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.221520] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.228423] device bridge0 left promiscuous mode 21:16:58 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) [ 331.303553] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.310024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.317161] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.323751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.330829] device bridge0 entered promiscuous mode 21:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:58 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:16:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d02403162857170") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 332.093248] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.100067] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.106989] device bridge0 left promiscuous mode 21:16:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0xa, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000001c0)=0x90) close(r2) close(r1) 21:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) [ 332.165788] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.172351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.179355] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.185982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.193162] device bridge0 entered promiscuous mode [ 332.199508] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 21:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:16:59 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:16:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:16:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:16:59 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:00 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x7, 0x2}) readv(r0, &(0x7f0000000240)=[{&(0x7f00000013c0)=""/135}, {&(0x7f0000001480)=""/25}, {&(0x7f00000003c0)=""/4096, 0x8}], 0x20000000000002ca) 21:17:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) [ 333.142028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:17:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:00 executing program 3: unshare(0x20000400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_ivalue=0x1}) 21:17:00 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:00 executing program 3: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)="ca", 0x1) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) getsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000200), &(0x7f0000000140)=0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x2c8}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000340)={0x90, 0xffffffffffffffda, 0x4, {0x0, 0x3, 0xde8f0000, 0x0, 0x9, 0x200000000, {0x4, 0xe2b, 0x6, 0x5d5d, 0x10000000000000, 0xa, 0x0, 0x10001, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x7e4}}}, 0x90) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="90fd1b8233d2e2dcd76ad8a3cc7a3c02fcdf77ebc2842a3bcaed4b14cf870cc11793949e4ba6458fc03ed75e7df58b9732b2e70c3010"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 21:17:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:01 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c", 0x12}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000, 0x9effffff00000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@nested={0x8, 0x0, [@generic="02"]}]}, 0x1c}}, 0x0) 21:17:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:17:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:17:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:01 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c", 0x12}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x4, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8978efce7d097a27"}}, 0x48}}, 0x0) 21:17:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:17:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:02 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa300", 0x1b}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)) io_destroy(0x0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x1) 21:17:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x4, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8978efce7d097a27"}}, 0x48}}, 0x0) 21:17:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:03 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa300", 0x1b}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)) umount2(&(0x7f0000000200)='./file0\x00', 0x4) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) dup3(0xffffffffffffffff, r0, 0x80000) 21:17:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:03 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000", 0x1f}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{0x100000, 0x4000, 0xd, 0x3f, 0x0, 0xfffffffffffffff8, 0x0, 0x4, 0x0, 0x1, 0x80000001}, {0xf000, 0x5000, 0x0, 0x3f, 0x0, 0x1, 0x356, 0x1, 0x0, 0x0, 0xd2bb}, {0x0, 0x0, 0x7, 0xcaf8, 0x89, 0x0, 0x5, 0x0, 0x7fffffff, 0xffffffff, 0x20}, {0x100002, 0x10000, 0xc, 0x5, 0x0, 0x0, 0x3f, 0x100, 0x8, 0x0, 0x5}, {0x2004, 0xf422806f9fb69f1f, 0xa, 0x7, 0xb94, 0x9, 0x0, 0x5, 0x209, 0x5, 0x4d, 0x3}, {0xf000, 0x5000, 0x0, 0x50000000000000, 0x80, 0x0, 0x9, 0x5, 0x3, 0x743a, 0x0, 0xcbf}, {0x0, 0x0, 0xf, 0x35ae, 0x101, 0x0, 0x1, 0x4, 0x0, 0x0, 0x1e}, {0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x5b76, 0xfffffffffffff086, 0x4, 0x0, 0x3ff, 0x100}, {0x2004, 0x5000}, {0x1, 0xf000}, 0x22, 0x0, 0x0, 0x4, 0x8, 0x0, 0x4000, [0x0, 0x3f, 0x3, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x1) 21:17:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:04 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000", 0x1f}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x1) 21:17:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{0x100000, 0x4000, 0xd, 0x3f, 0x0, 0xfffffffffffffff8, 0x0, 0x4, 0x0, 0x1, 0x80000001}, {0xf000, 0x5000, 0x0, 0x3f, 0x0, 0x1, 0x356, 0x1, 0x0, 0x0, 0xd2bb}, {0x0, 0x0, 0x7, 0xcaf8, 0x89, 0x0, 0x5, 0x0, 0x7fffffff, 0xffffffff, 0x20}, {0x100002, 0x10000, 0xc, 0x5, 0x0, 0x0, 0x3f, 0x100, 0x8, 0x0, 0x5}, {0x2004, 0xf422806f9fb69f1f, 0xa, 0x7, 0xb94, 0x9, 0x0, 0x5, 0x209, 0x5, 0x4d, 0x3}, {0xf000, 0x5000, 0x0, 0x50000000000000, 0x80, 0x0, 0x9, 0x5, 0x3, 0x743a, 0x0, 0xcbf}, {0x0, 0x0, 0xf, 0x35ae, 0x101, 0x0, 0x1, 0x4, 0x0, 0x0, 0x1e}, {0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x5b76, 0xfffffffffffff086, 0x4, 0x0, 0x3ff, 0x100}, {0x2004, 0x5000}, {0x1, 0xf000}, 0x22, 0x0, 0x0, 0x4, 0x8, 0x0, 0x4000, [0x0, 0x3f, 0x3, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:04 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b", 0x21}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{0x100000, 0x4000, 0xd, 0x3f, 0x0, 0xfffffffffffffff8, 0x0, 0x4, 0x0, 0x1, 0x80000001}, {0xf000, 0x5000, 0x0, 0x3f, 0x0, 0x1, 0x356, 0x1, 0x0, 0x0, 0xd2bb}, {0x0, 0x0, 0x7, 0xcaf8, 0x89, 0x0, 0x5, 0x0, 0x7fffffff, 0xffffffff, 0x20}, {0x100002, 0x10000, 0xc, 0x5, 0x0, 0x0, 0x3f, 0x100, 0x8, 0x0, 0x5}, {0x2004, 0xf422806f9fb69f1f, 0xa, 0x7, 0xb94, 0x9, 0x0, 0x5, 0x209, 0x5, 0x4d, 0x3}, {0xf000, 0x5000, 0x0, 0x50000000000000, 0x80, 0x0, 0x9, 0x5, 0x3, 0x743a, 0x0, 0xcbf}, {0x0, 0x0, 0xf, 0x35ae, 0x101, 0x0, 0x1, 0x4, 0x0, 0x0, 0x1e}, {0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x5b76, 0xfffffffffffff086, 0x4, 0x0, 0x3ff, 0x100}, {0x2004, 0x5000}, {0x1, 0xf000}, 0x22, 0x0, 0x0, 0x4, 0x8, 0x0, 0x4000, [0x0, 0x3f, 0x3, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:05 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b", 0x21}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 21:17:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) io_setup(0x1, &(0x7f0000000100)=0x0) io_destroy(r0) prctl$setname(0xf, &(0x7f0000000240)='stat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080), 0x0) 21:17:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) write$P9_RGETATTR(r1, &(0x7f0000000340)={0xa0}, 0xa0) 21:17:06 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b18", 0x22}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:06 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fchownat(r0, &(0x7f0000000280)='\x00', 0x0, 0x0, 0x1000) 21:17:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e676570726f66696c65203a21236ef19070b75766598df8de503eb24de63a6b657972696e6773656c666574683070707030252b70707031006289f1d9cd0de17947338e8939669da5e63d5d96450da471c3f060a9214920c14c809687db9af15c1e2b45966b5c0b1ef50ee383e5637bbcc76ab28c0f8bb16e1ee52439e20574381dbd0f054239ae4e2548c1842226082fa2f74a22e0743e23014adb0231a4095f50e8319319b25ca083e3e885af46bad44edba42c163207c85da397f5d6e4ee080823f29266335eb2ac05c3ccfe4c04c092833e320d48a43e2938bebbe49b155f18c90b29190a27281d8343b931fbddebaa1e2ca4a5acc6419852f54fe81b6cf81eacde8fafd61e0a4311"], 0x1) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x135) 21:17:06 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b18", 0x22}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x8, &(0x7f0000000240)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000340)={'irlan0\x00', 0x104002}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x7}]) 21:17:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:06 executing program 3: 21:17:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) [ 339.829354] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.835992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.843276] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.849754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.859528] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 339.866680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.873507] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:17:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 339.909166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.993353] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:17:07 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) sendto$inet(r0, &(0x7f0000762fff), 0xff1b, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) [ 340.156129] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.163085] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.169772] device bridge0 left promiscuous mode 21:17:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:07 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 21:17:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x8, &(0x7f0000000240)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000340)={'irlan0\x00', 0x104002}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x7}]) 21:17:07 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:07 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6368616e676570726f66696c6520ff3a5d70726f6328"], 0x1) 21:17:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 341.071242] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:17:08 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:08 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:08 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6368616e676570726f66696c6520ff3a5d70726f6328"], 0x1) 21:17:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 21:17:08 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)) umount2(&(0x7f0000000200)='./file0\x00', 0x4) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) dup3(r1, r0, 0x80000) 21:17:08 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:08 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000100)={"62726964676530000000008000", &(0x7f0000000140)=ANY=[]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000140)="0f01cf0f01efba4200ed260f015d0af020b3f03c673636660f383d98fd0500000f01df0fbea800000f0118baf80c66b8be3bb28f66efbafc0cec", 0x3a}], 0x1, 0x0, &(0x7f0000000240), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, &(0x7f0000000480), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000540)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000500), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0xfffffffffffffffd) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:17:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 21:17:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:09 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:09 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:09 executing program 5: 21:17:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x800000000000000a, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 21:17:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:10 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:10 executing program 5: 21:17:10 executing program 0: 21:17:10 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000100)={"62726964676530000000008000", &(0x7f0000000140)=ANY=[]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000140)="0f01cf0f01efba4200ed260f015d0af020b3f03c673636660f383d98fd0500000f01df0fbea800000f0118baf80c66b8be3bb28f66efbafc0cec", 0x3a}], 0x1, 0x0, &(0x7f0000000240), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, &(0x7f0000000480), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000540)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000500), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0xfffffffffffffffd) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:17:10 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:10 executing program 0: 21:17:10 executing program 5: 21:17:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:10 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:11 executing program 0: 21:17:11 executing program 5: 21:17:11 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:11 executing program 3: 21:17:11 executing program 0: 21:17:11 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:11 executing program 3: 21:17:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:12 executing program 5: 21:17:12 executing program 0: 21:17:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:12 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:12 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:12 executing program 3: 21:17:12 executing program 5: 21:17:12 executing program 0: 21:17:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:12 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:13 executing program 5: 21:17:13 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:13 executing program 0: 21:17:13 executing program 3: 21:17:13 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:13 executing program 5: 21:17:13 executing program 3: 21:17:13 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:13 executing program 0: 21:17:13 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:14 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:14 executing program 5: 21:17:14 executing program 3: 21:17:14 executing program 0: 21:17:14 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:14 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:14 executing program 3: 21:17:14 executing program 5: 21:17:14 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:14 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:14 executing program 0: 21:17:14 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:15 executing program 3: 21:17:15 executing program 5: 21:17:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:15 executing program 0: 21:17:15 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:15 executing program 3: 21:17:15 executing program 5: 21:17:15 executing program 0: 21:17:15 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:15 executing program 3: 21:17:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:15 executing program 5: 21:17:16 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:16 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) 21:17:16 executing program 3: 21:17:16 executing program 0: 21:17:16 executing program 5: 21:17:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:16 executing program 3: 21:17:16 executing program 0: 21:17:16 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:16 executing program 2: 21:17:16 executing program 5: 21:17:16 executing program 3: perf_event_open(&(0x7f0000001280)={0x40000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:17:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 21:17:17 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:17 executing program 2: 21:17:17 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1, &(0x7f0000000040)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@nfc_llcp, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=""/30, 0xfffffe29}, 0x0) recvmsg$kcm(r0, &(0x7f0000000a00)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000002a40)=""/4096, 0x1000}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000002c40), 0x0, &(0x7f0000001580)=""/3, 0x3}, 0x0) 21:17:17 executing program 3: 21:17:17 executing program 5: 21:17:17 executing program 2: 21:17:17 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) 21:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 21:17:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:17:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001440)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000), 0x0) 21:17:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000240), 0xc, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000002000010000000000000000000200000000000000200000001c000000080015000000000008000b000000000008000b00000000000c0014000df42da30cb17768a4d3ff6bffd31960542527fda0c53ae0b99b089ddc210496", @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) 21:17:18 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = semget$private(0x0, 0x8, 0x80) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:18 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/28, 0x1c) 21:17:18 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) fchownat(r0, &(0x7f0000000280)='\x00', 0x0, 0x0, 0x1000) setxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000240)=@known='system.posix_acl_default\x00', &(0x7f0000000180)='.[em1!$cgroup$\x00', 0xf, 0x0) 21:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0xfb29f8e984cc75ea, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 21:17:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x100000132) readv(r2, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1) 21:17:18 executing program 5: clone(0x80007ff, 0x0, 0xfffffffffffffffe, &(0x7f00000013c0), 0xffffffffffffffff) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000001200)={0x2, 0x4e21, @remote}, 0x10) r0 = socket$inet(0x2, 0x1, 0x0) add_key$user(&(0x7f0000001240)='user\x00', &(0x7f0000001280)={'syz'}, &(0x7f00000012c0)="e32effd54c6ce8206b418416b47d866f0d", 0x11, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000001380)='.dead\x00', &(0x7f0000001400)={'syz'}, &(0x7f0000001440)='system\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, r1) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000080)={'filter\x00', 0x0, 0x0, 0xfffffefb, [], 0x21c, &(0x7f0000000040), &(0x7f0000000200)=""/4096}, &(0x7f0000000140)=0x108) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x78) 21:17:19 executing program 2: r0 = socket$inet(0x2, 0x4004000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80010000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0xcecf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x287, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0xdf15, 0x0, 0x0, 0x0, 0x57b3, 0x0, 0x7, 0x3f7, 0x9, 0x6, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x9476}, 0x8000, 0x7fffffff, 0xffffffff}, 0x0, 0xb, r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 352.059351] kernel msg: ebtables bug: please report to author: Wrong size 21:17:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) quotactl(0xfffffffffffffff9, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000300)="19303e08268023a7bf774aca5079375e90f3b9704703872736454f186d4fe370c590c0cb3659f5191c56f9da683ba3f9c561") bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) signalfd(r1, &(0x7f0000000340)={0x7}, 0x8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x1470c1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x53, "ebdbfe9b406d4cd008256b0fe85d769e95460e0d89289b710a6a7c4d456d518ced36c89422411cee34fd8a9ab7c58a2e25a36fb92569943cbde0107f281618a3011691c16c495a1eeb9eafd28cb57883fe804e"}, &(0x7f0000000440)=0x5b) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000480)={0xf51, 0x400, 0x3, 0x1, 0x100, 0x1a754000000, 0x9, 0x0, r4}, &(0x7f00000004c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000500)={0x2, 0x200, 0x2, 0x400, r5}, &(0x7f0000000540)=0x10) 21:17:19 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = semget$private(0x0, 0x8, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) [ 352.671764] not chained 30000 origins [ 352.675648] CPU: 0 PID: 9294 Comm: syz-executor5 Not tainted 4.19.0+ #77 [ 352.682770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.692147] Call Trace: [ 352.694754] [ 352.696972] dump_stack+0x32d/0x480 [ 352.700647] ? kmsan_internal_chain_origin+0x136/0x240 [ 352.705990] kmsan_internal_chain_origin+0x222/0x240 [ 352.711136] ? net_rx_action+0x98f/0x1d50 [ 352.715326] ? page_remove_rmap+0x15a/0x1800 [ 352.719772] ? unmap_page_range+0x1f9f/0x3d50 [ 352.724311] ? unmap_single_vma+0x43f/0x5e0 [ 352.728671] ? unmap_vmas+0x251/0x380 [ 352.732506] ? exit_mmap+0x51e/0xa10 [ 352.736259] ? __mmput+0x17a/0x700 [ 352.739832] ? mmput+0x190/0x210 [ 352.743225] ? exit_mm+0xa95/0xc80 [ 352.746801] ? do_exit+0x10f2/0x4060 [ 352.750541] ? do_group_exit+0x1c0/0x370 [ 352.754634] ? get_signal+0x1293/0x24b0 [ 352.758640] ? do_signal+0x1f3/0x2ff0 [ 352.762466] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 352.767510] ? syscall_return_slowpath+0x123/0x8c0 [ 352.772465] ? do_syscall_64+0xf5/0x110 [ 352.776469] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.781864] ? get_signal+0x1293/0x24b0 [ 352.785887] ? do_signal+0x1f3/0x2ff0 [ 352.789733] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 352.794781] ? syscall_return_slowpath+0x123/0x8c0 [ 352.799736] ? do_syscall_64+0xf5/0x110 [ 352.803740] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.809159] ? get_stack_info+0x863/0x9d0 [ 352.813357] __msan_chain_origin+0x6d/0xd0 [ 352.817622] ? get_signal+0x1293/0x24b0 21:17:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000180)={'ifb0\x00'}) [ 352.821626] __save_stack_trace+0x8be/0xc60 [ 352.826012] ? get_signal+0x1293/0x24b0 [ 352.830027] save_stack_trace+0xc6/0x110 [ 352.834120] kmsan_internal_chain_origin+0x136/0x240 [ 352.839248] ? __msan_poison_alloca+0x6f/0x2b0 [ 352.843868] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 352.848960] ? kmsan_internal_chain_origin+0x136/0x240 [ 352.854257] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 352.858952] ? __msan_memcpy+0x6f/0x80 [ 352.862861] ? pskb_expand_head+0x43b/0x1d20 [ 352.867306] ? ___pskb_trim+0x3c9/0x1bf0 [ 352.871396] ? sk_filter_trim_cap+0x5ac/0xa60 [ 352.875940] ? tcp_v4_rcv+0x4a3b/0x6540 [ 352.879954] ? ip_local_deliver_finish+0x8cf/0xff0 [ 352.884930] ? ip_local_deliver+0x44b/0x510 [ 352.889285] ? ip_rcv+0x6b6/0x740 [ 352.892773] ? process_backlog+0x82b/0x11e0 [ 352.897141] ? net_rx_action+0x98f/0x1d50 [ 352.901324] ? __do_softirq+0x721/0xc5d [ 352.905334] ? irq_exit+0x305/0x340 [ 352.908997] ? exiting_irq+0xe/0x10 [ 352.912658] ? smp_apic_timer_interrupt+0x64/0x90 [ 352.917528] ? apic_timer_interrupt+0xf/0x20 [ 352.921995] ? __msan_poison_alloca+0x6f/0x2b0 [ 352.926612] ? page_remove_rmap+0x15a/0x1800 [ 352.931053] ? unmap_page_range+0x1f9f/0x3d50 [ 352.935578] ? unmap_single_vma+0x43f/0x5e0 [ 352.939946] ? unmap_vmas+0x251/0x380 [ 352.943779] ? exit_mmap+0x51e/0xa10 [ 352.947526] ? __mmput+0x17a/0x700 [ 352.951099] ? mmput+0x190/0x210 [ 352.954496] ? exit_mm+0xa95/0xc80 [ 352.958097] ? do_exit+0x10f2/0x4060 [ 352.961843] ? do_group_exit+0x1c0/0x370 [ 352.965958] ? get_signal+0x1293/0x24b0 [ 352.969978] ? do_signal+0x1f3/0x2ff0 [ 352.973813] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 352.978866] ? syscall_return_slowpath+0x123/0x8c0 [ 352.983890] ? do_syscall_64+0xf5/0x110 [ 352.987947] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.993365] ? memcg_kmem_put_cache+0x8e/0x460 [ 352.997994] ? __msan_get_context_state+0x9/0x30 [ 353.002779] ? INIT_INT+0xc/0x30 [ 353.006178] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 353.011600] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.016146] __msan_memcpy+0x6f/0x80 [ 353.019929] pskb_expand_head+0x43b/0x1d20 [ 353.024235] ___pskb_trim+0x3c9/0x1bf0 [ 353.028189] sk_filter_trim_cap+0x5ac/0xa60 [ 353.032569] tcp_v4_rcv+0x4a3b/0x6540 [ 353.036478] ? tcp_filter+0x260/0x260 [ 353.040311] ip_local_deliver_finish+0x8cf/0xff0 [ 353.045122] ip_local_deliver+0x44b/0x510 [ 353.049318] ? ip_local_deliver+0x510/0x510 [ 353.053668] ? ip_call_ra_chain+0x7a0/0x7a0 [ 353.058027] ip_rcv+0x6b6/0x740 [ 353.061350] ? ip_rcv_core+0x1360/0x1360 [ 353.065445] process_backlog+0x82b/0x11e0 [ 353.069632] ? ip_local_deliver_finish+0xff0/0xff0 [ 353.074613] ? rps_trigger_softirq+0x2e0/0x2e0 [ 353.079227] net_rx_action+0x98f/0x1d50 [ 353.083273] ? net_tx_action+0xf20/0xf20 [ 353.087367] __do_softirq+0x721/0xc5d [ 353.091225] irq_exit+0x305/0x340 [ 353.094714] exiting_irq+0xe/0x10 [ 353.098205] smp_apic_timer_interrupt+0x64/0x90 [ 353.102929] apic_timer_interrupt+0xf/0x20 [ 353.107186] [ 353.109458] RIP: 0010:__msan_poison_alloca+0x6f/0x2b0 [ 353.114678] Code: 89 44 24 28 c7 44 24 30 00 00 00 00 80 3c 25 00 70 4e 8c 00 0f 84 d8 01 00 00 65 48 8b 04 25 00 fd 02 00 83 b8 7c 09 00 00 00 <0f> 85 c2 01 00 00 49 89 d7 49 89 fc 48 89 44 24 10 48 89 74 24 08 [ 353.133606] RSP: 0018:ffff88011864f0e0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 353.141342] RAX: ffff880169161e00 RBX: ffffea00073390e0 RCX: 0000000000000002 [ 353.148634] RDX: ffffffff8bb148f0 RSI: 0000000000000008 RDI: ffff88011864f1d0 [ 353.155954] RBP: ffff88011864f178 R08: 0000000000480020 R09: 0000000000000002 [ 353.163252] R10: ffffffff8ae013f8 R11: ffffffff8b000000 R12: 0000000000000000 [ 353.170548] R13: 0000000000000000 R14: 0000000000000000 R15: ffff880169162788 [ 353.177871] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 353.183032] ? __entry_text_end+0x7/0x7 [ 353.187056] ? page_remove_rmap+0x145/0x1800 [ 353.191493] ? unmap_page_range+0x1f9f/0x3d50 [ 353.196034] page_remove_rmap+0x15a/0x1800 [ 353.200316] unmap_page_range+0x1f9f/0x3d50 [ 353.204753] unmap_single_vma+0x43f/0x5e0 [ 353.208979] unmap_vmas+0x251/0x380 [ 353.212658] exit_mmap+0x51e/0xa10 [ 353.216238] ? __khugepaged_exit+0x71d/0x8b0 [ 353.220693] __mmput+0x17a/0x700 [ 353.224115] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 353.229524] mmput+0x190/0x210 [ 353.232757] exit_mm+0xa95/0xc80 [ 353.236176] do_exit+0x10f2/0x4060 [ 353.239777] do_group_exit+0x1c0/0x370 [ 353.243711] get_signal+0x1293/0x24b0 [ 353.247563] ? __se_sys_futex+0x3e7/0x7e0 [ 353.251751] ? __msan_poison_alloca+0x1e0/0x2b0 [ 353.256466] ? do_signal+0x1dd/0x2ff0 [ 353.260292] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 353.265396] do_signal+0x1f3/0x2ff0 [ 353.269072] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.274471] ? kmsan_set_origin+0x83/0x130 [ 353.278769] prepare_exit_to_usermode+0x2c9/0x4d0 [ 353.283658] syscall_return_slowpath+0x123/0x8c0 [ 353.288565] do_syscall_64+0xf5/0x110 [ 353.292401] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.297620] RIP: 0033:0x457569 [ 353.300839] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.319767] RSP: 002b:00007fdd7185dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 353.327511] RAX: fffffffffffffe00 RBX: 000000000072bfa8 RCX: 0000000000457569 [ 353.334808] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000072bfa8 [ 353.342113] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 353.349461] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000072bfac [ 353.356805] R13: 0000000000a3fb7f R14: 00007fdd7185e9c0 R15: 0000000000000001 [ 353.364118] Uninit was stored to memory at: [ 353.368472] kmsan_internal_chain_origin+0x136/0x240 [ 353.373606] __msan_chain_origin+0x6d/0xd0 [ 353.377866] __save_stack_trace+0x8be/0xc60 [ 353.382240] save_stack_trace+0xc6/0x110 [ 353.386333] kmsan_internal_chain_origin+0x136/0x240 [ 353.391559] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.396087] __msan_memcpy+0x6f/0x80 [ 353.399829] pskb_expand_head+0x43b/0x1d20 [ 353.404232] ___pskb_trim+0x3c9/0x1bf0 [ 353.408198] sk_filter_trim_cap+0x5ac/0xa60 [ 353.412547] tcp_v4_rcv+0x4a3b/0x6540 [ 353.416372] ip_local_deliver_finish+0x8cf/0xff0 [ 353.421153] ip_local_deliver+0x44b/0x510 [ 353.425416] ip_rcv+0x6b6/0x740 [ 353.428807] process_backlog+0x82b/0x11e0 [ 353.432979] net_rx_action+0x98f/0x1d50 [ 353.436985] __do_softirq+0x721/0xc5d [ 353.440798] [ 353.442442] Uninit was stored to memory at: [ 353.446791] kmsan_internal_chain_origin+0x136/0x240 [ 353.451943] __msan_chain_origin+0x6d/0xd0 [ 353.456208] __save_stack_trace+0x8be/0xc60 [ 353.460553] save_stack_trace+0xc6/0x110 [ 353.464664] kmsan_internal_chain_origin+0x136/0x240 [ 353.469792] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.474315] __msan_memcpy+0x6f/0x80 [ 353.478051] pskb_expand_head+0x43b/0x1d20 [ 353.482306] ___pskb_trim+0x3c9/0x1bf0 [ 353.486217] sk_filter_trim_cap+0x5ac/0xa60 [ 353.490561] tcp_v4_rcv+0x4a3b/0x6540 [ 353.494387] ip_local_deliver_finish+0x8cf/0xff0 [ 353.499172] ip_local_deliver+0x44b/0x510 [ 353.503343] ip_rcv+0x6b6/0x740 [ 353.506648] process_backlog+0x82b/0x11e0 [ 353.510819] net_rx_action+0x98f/0x1d50 [ 353.514818] __do_softirq+0x721/0xc5d [ 353.518627] [ 353.520265] Uninit was stored to memory at: [ 353.524616] kmsan_internal_chain_origin+0x136/0x240 [ 353.529801] __msan_chain_origin+0x6d/0xd0 [ 353.534063] __save_stack_trace+0x8be/0xc60 [ 353.538410] save_stack_trace+0xc6/0x110 [ 353.542497] kmsan_internal_chain_origin+0x136/0x240 [ 353.547626] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.552145] __msan_memcpy+0x6f/0x80 [ 353.555976] pskb_expand_head+0x43b/0x1d20 [ 353.560233] ___pskb_trim+0x3c9/0x1bf0 [ 353.564146] sk_filter_trim_cap+0x5ac/0xa60 [ 353.568492] tcp_v4_rcv+0x4a3b/0x6540 [ 353.572320] ip_local_deliver_finish+0x8cf/0xff0 [ 353.577099] ip_local_deliver+0x44b/0x510 [ 353.581272] ip_rcv+0x6b6/0x740 [ 353.584577] process_backlog+0x82b/0x11e0 [ 353.588751] net_rx_action+0x98f/0x1d50 [ 353.592951] __do_softirq+0x721/0xc5d [ 353.596764] [ 353.598403] Uninit was stored to memory at: [ 353.602754] kmsan_internal_chain_origin+0x136/0x240 [ 353.607880] __msan_chain_origin+0x6d/0xd0 [ 353.612168] __save_stack_trace+0x8be/0xc60 [ 353.616514] save_stack_trace+0xc6/0x110 [ 353.620599] kmsan_internal_chain_origin+0x136/0x240 [ 353.625817] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.630342] __msan_memcpy+0x6f/0x80 [ 353.634080] pskb_expand_head+0x43b/0x1d20 [ 353.638341] ___pskb_trim+0x3c9/0x1bf0 [ 353.642256] sk_filter_trim_cap+0x5ac/0xa60 [ 353.646691] tcp_v4_rcv+0x4a3b/0x6540 [ 353.650516] ip_local_deliver_finish+0x8cf/0xff0 [ 353.655295] ip_local_deliver+0x44b/0x510 [ 353.659470] ip_rcv+0x6b6/0x740 [ 353.662773] process_backlog+0x82b/0x11e0 [ 353.666960] net_rx_action+0x98f/0x1d50 [ 353.670964] __do_softirq+0x721/0xc5d [ 353.674773] [ 353.676411] Uninit was stored to memory at: [ 353.680762] kmsan_internal_chain_origin+0x136/0x240 [ 353.686000] __msan_chain_origin+0x6d/0xd0 [ 353.690257] __save_stack_trace+0x8be/0xc60 [ 353.694604] save_stack_trace+0xc6/0x110 [ 353.698690] kmsan_internal_chain_origin+0x136/0x240 [ 353.703820] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.708343] __msan_memcpy+0x6f/0x80 [ 353.712083] pskb_expand_head+0x43b/0x1d20 [ 353.716339] ___pskb_trim+0x3c9/0x1bf0 [ 353.720254] sk_filter_trim_cap+0x5ac/0xa60 [ 353.724603] tcp_v4_rcv+0x4a3b/0x6540 [ 353.728431] ip_local_deliver_finish+0x8cf/0xff0 [ 353.733214] ip_local_deliver+0x44b/0x510 [ 353.737386] ip_rcv+0x6b6/0x740 [ 353.740695] process_backlog+0x82b/0x11e0 [ 353.744870] net_rx_action+0x98f/0x1d50 [ 353.748892] __do_softirq+0x721/0xc5d [ 353.752733] [ 353.754376] Uninit was stored to memory at: [ 353.758727] kmsan_internal_chain_origin+0x136/0x240 [ 353.763856] __msan_chain_origin+0x6d/0xd0 [ 353.768137] __save_stack_trace+0x8be/0xc60 [ 353.772481] save_stack_trace+0xc6/0x110 [ 353.776570] kmsan_internal_chain_origin+0x136/0x240 [ 353.781698] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.786217] __msan_memcpy+0x6f/0x80 [ 353.789958] pskb_expand_head+0x43b/0x1d20 [ 353.794216] ___pskb_trim+0x3c9/0x1bf0 [ 353.798129] sk_filter_trim_cap+0x5ac/0xa60 [ 353.802477] tcp_v4_rcv+0x4a3b/0x6540 [ 353.806301] ip_local_deliver_finish+0x8cf/0xff0 [ 353.811081] ip_local_deliver+0x44b/0x510 [ 353.815254] ip_rcv+0x6b6/0x740 [ 353.818559] process_backlog+0x82b/0x11e0 [ 353.822736] net_rx_action+0x98f/0x1d50 [ 353.826734] __do_softirq+0x721/0xc5d [ 353.830544] [ 353.832185] Uninit was stored to memory at: [ 353.836533] kmsan_internal_chain_origin+0x136/0x240 [ 353.841669] __msan_chain_origin+0x6d/0xd0 [ 353.845960] __save_stack_trace+0x8be/0xc60 [ 353.850306] save_stack_trace+0xc6/0x110 [ 353.854391] kmsan_internal_chain_origin+0x136/0x240 [ 353.859525] kmsan_memcpy_origins+0x13d/0x1b0 [ 353.864045] __msan_memcpy+0x6f/0x80 [ 353.867785] pskb_expand_head+0x43b/0x1d20 [ 353.872041] ___pskb_trim+0x3c9/0x1bf0 [ 353.875971] sk_filter_trim_cap+0x5ac/0xa60 [ 353.880312] tcp_v4_rcv+0x4a3b/0x6540 [ 353.884139] ip_local_deliver_finish+0x8cf/0xff0 [ 353.888943] ip_local_deliver+0x44b/0x510 [ 353.893118] ip_rcv+0x6b6/0x740 [ 353.896419] process_backlog+0x82b/0x11e0 [ 353.900590] net_rx_action+0x98f/0x1d50 [ 353.904592] __do_softirq+0x721/0xc5d [ 353.908401] [ 353.910046] Local variable description: ----old.addr.i.i.i@should_fail [ 353.916723] Variable was created at: [ 353.920500] should_fail+0x123/0x13c0 21:17:21 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) [ 353.924334] __should_failslab+0x278/0x2a0 [ 353.983426] not chained 40000 origins [ 353.987380] CPU: 0 PID: 9303 Comm: syz-executor0 Not tainted 4.19.0+ #77 [ 353.994247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.003627] Call Trace: [ 354.006237] [ 354.008432] dump_stack+0x32d/0x480 [ 354.012112] ? kmsan_internal_chain_origin+0x136/0x240 [ 354.017438] kmsan_internal_chain_origin+0x222/0x240 [ 354.022573] ? skb_shift+0xcee/0x2d10 [ 354.026426] ? ip_local_deliver_finish+0x8cf/0xff0 [ 354.031392] ? ip_local_deliver+0x44b/0x510 [ 354.035751] ? ip_rcv+0x6b6/0x740 [ 354.039241] ? process_backlog+0x82b/0x11e0 [ 354.043601] ? net_rx_action+0x98f/0x1d50 [ 354.047786] ? __do_softirq+0x721/0xc5d [ 354.051793] ? irq_exit+0x305/0x340 [ 354.055460] ? exiting_irq+0xe/0x10 [ 354.059125] ? smp_apic_timer_interrupt+0x64/0x90 [ 354.064014] ? apic_timer_interrupt+0xf/0x20 [ 354.068456] ? __msan_poison_alloca+0x19f/0x2b0 [ 354.073156] ? unmap_page_range+0x116/0x3d50 [ 354.077600] ? unmap_single_vma+0x43f/0x5e0 [ 354.081973] ? unmap_vmas+0x251/0x380 [ 354.085818] ? exit_mmap+0x51e/0xa10 [ 354.089567] ? __mmput+0x17a/0x700 [ 354.093136] ? mmput+0x190/0x210 [ 354.096715] ? exit_mm+0xa95/0xc80 [ 354.100291] ? do_exit+0x10f2/0x4060 [ 354.104041] ? do_group_exit+0x1c0/0x370 [ 354.108140] ? get_signal+0x1293/0x24b0 [ 354.112155] ? do_signal+0x1f3/0x2ff0 [ 354.115995] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 354.121042] ? syscall_return_slowpath+0x123/0x8c0 [ 354.126007] ? ret_from_fork+0x15/0x40 [ 354.129958] ? __irqentry_text_end+0x1fa056/0x1fa056 [ 354.135108] ? kmsan_internal_chain_origin+0x90/0x240 [ 354.140362] ? get_stack_info+0x863/0x9d0 [ 354.144568] __msan_chain_origin+0x6d/0xd0 [ 354.148840] ? smp_apic_timer_interrupt+0x64/0x90 [ 354.153720] __save_stack_trace+0x8be/0xc60 [ 354.158106] ? smp_apic_timer_interrupt+0x64/0x90 [ 354.162991] save_stack_trace+0xc6/0x110 [ 354.167103] kmsan_internal_chain_origin+0x136/0x240 [ 354.172240] ? irq_exit+0x305/0x340 [ 354.175938] ? do_group_exit+0x1c0/0x370 [ 354.180038] ? kmsan_internal_chain_origin+0x136/0x240 [ 354.185344] ? kmsan_memcpy_origins+0x13d/0x1b0 [ 354.190047] ? __msan_memcpy+0x6f/0x80 [ 354.193978] ? pskb_expand_head+0x43b/0x1d20 [ 354.198422] ? skb_shift+0xcee/0x2d10 [ 354.202264] ? tcp_sacktag_walk+0x20ff/0x2960 [ 354.206798] ? tcp_sacktag_write_queue+0x2805/0x4630 [ 354.211966] ? tcp_ack+0x290e/0x9da0 [ 354.215717] ? tcp_rcv_established+0x1078/0x2a20 [ 354.220504] ? tcp_v4_do_rcv+0x686/0xd80 [ 354.224598] ? tcp_v4_rcv+0x5a33/0x6540 [ 354.228611] ? ip_local_deliver_finish+0x8cf/0xff0 [ 354.233577] ? ip_local_deliver+0x44b/0x510 [ 354.237956] ? ip_rcv+0x6b6/0x740 [ 354.241446] ? process_backlog+0x82b/0x11e0 [ 354.245809] ? net_rx_action+0x98f/0x1d50 [ 354.249994] ? __do_softirq+0x721/0xc5d [ 354.254004] ? irq_exit+0x305/0x340 [ 354.257660] ? exiting_irq+0xe/0x10 [ 354.261326] ? smp_apic_timer_interrupt+0x64/0x90 [ 354.266205] ? apic_timer_interrupt+0xf/0x20 [ 354.270675] ? __msan_poison_alloca+0x19f/0x2b0 [ 354.275375] ? unmap_page_range+0x116/0x3d50 [ 354.279813] ? unmap_single_vma+0x43f/0x5e0 [ 354.284169] ? unmap_vmas+0x251/0x380 [ 354.288003] ? exit_mmap+0x51e/0xa10 [ 354.291748] ? __mmput+0x17a/0x700 [ 354.295316] ? mmput+0x190/0x210 [ 354.298712] ? exit_mm+0xa95/0xc80 [ 354.302287] ? do_exit+0x10f2/0x4060 [ 354.306053] ? do_group_exit+0x1c0/0x370 [ 354.310326] ? get_signal+0x1293/0x24b0 [ 354.314332] ? do_signal+0x1f3/0x2ff0 [ 354.318166] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 354.323213] ? syscall_return_slowpath+0x123/0x8c0 [ 354.328174] ? ret_from_fork+0x15/0x40 [ 354.332100] ? memcg_kmem_put_cache+0x8e/0x460 [ 354.336731] ? __msan_get_context_state+0x9/0x30 [ 354.341621] ? INIT_INT+0xc/0x30 [ 354.345022] ? __kmalloc_node_track_caller+0x369/0x14e0 [ 354.350441] kmsan_memcpy_origins+0x13d/0x1b0 [ 354.355000] __msan_memcpy+0x6f/0x80 [ 354.358751] pskb_expand_head+0x43b/0x1d20 [ 354.363048] skb_shift+0xcee/0x2d10 [ 354.366758] tcp_sacktag_walk+0x20ff/0x2960 [ 354.371162] tcp_sacktag_write_queue+0x2805/0x4630 [ 354.376185] tcp_ack+0x290e/0x9da0 [ 354.379762] ? tcp_parse_options+0xbe/0x1cf0 21:17:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x0, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) [ 354.384205] ? tcp_validate_incoming+0x50b/0x29d0 [ 354.389090] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 354.394574] ? tcp_parse_options+0x1c55/0x1cf0 [ 354.399279] tcp_rcv_established+0x1078/0x2a20 [ 354.403945] ? __msan_get_context_state+0x9/0x30 [ 354.408756] tcp_v4_do_rcv+0x686/0xd80 [ 354.412701] tcp_v4_rcv+0x5a33/0x6540 [ 354.416621] ? tcp_filter+0x260/0x260 [ 354.420463] ip_local_deliver_finish+0x8cf/0xff0 [ 354.425286] ip_local_deliver+0x44b/0x510 [ 354.429487] ? ip_local_deliver+0x510/0x510 21:17:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") syz_emit_ethernet(0x36, &(0x7f0000000040)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0xffff8000, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)) [ 354.433846] ? ip_call_ra_chain+0x7a0/0x7a0 [ 354.438209] ip_rcv+0x6b6/0x740 [ 354.441538] ? ip_rcv_core+0x1360/0x1360 [ 354.445651] process_backlog+0x82b/0x11e0 [ 354.449849] ? ip_local_deliver_finish+0xff0/0xff0 [ 354.454839] ? rps_trigger_softirq+0x2e0/0x2e0 [ 354.459462] net_rx_action+0x98f/0x1d50 [ 354.463510] ? net_tx_action+0xf20/0xf20 [ 354.467611] __do_softirq+0x721/0xc5d [ 354.471472] irq_exit+0x305/0x340 [ 354.474979] exiting_irq+0xe/0x10 [ 354.478468] smp_apic_timer_interrupt+0x64/0x90 21:17:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000380)=0x80000008) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) [ 354.483173] apic_timer_interrupt+0xf/0x20 [ 354.487428] [ 354.489706] RIP: 0010:__msan_poison_alloca+0x19f/0x2b0 [ 354.495015] Code: 24 18 ff 74 24 18 9d 44 89 e0 83 e0 03 41 01 c6 45 85 f6 0f 8e a9 00 00 00 49 29 c4 44 89 e0 25 ff 0f 00 00 41 bd 00 10 00 00 <49> 29 c5 49 63 c6 49 39 c5 4c 0f 47 e8 0f 1f 40 00 49 83 c5 03 4c [ 354.513961] RSP: 0018:ffff88011f6df1a0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 354.521702] RAX: 0000000000000468 RBX: ffff88013bdf1e00 RCX: ffff88011f6df1e0 [ 354.529005] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000007612a9c9 [ 354.536300] RBP: ffff88011f6df240 R08: 0000000000480020 R09: 0000000000000002 [ 354.543603] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88011f6df468 [ 354.551416] R13: 0000000000001000 R14: 0000000000000001 R15: 00000000e38000ca [ 354.558766] ? unmap_page_range+0x116/0x3d50 [ 354.563210] ? unmap_single_vma+0x43f/0x5e0 [ 354.567574] ? _cond_resched+0x59/0x120 [ 354.571596] unmap_page_range+0x116/0x3d50 [ 354.575983] unmap_single_vma+0x43f/0x5e0 [ 354.580191] unmap_vmas+0x251/0x380 [ 354.583879] exit_mmap+0x51e/0xa10 [ 354.587509] ? __khugepaged_exit+0x71d/0x8b0 [ 354.591987] __mmput+0x17a/0x700 [ 354.595395] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 354.600810] mmput+0x190/0x210 [ 354.604056] exit_mm+0xa95/0xc80 [ 354.607489] do_exit+0x10f2/0x4060 [ 354.611095] do_group_exit+0x1c0/0x370 [ 354.615039] get_signal+0x1293/0x24b0 [ 354.618957] ? __msan_poison_alloca+0x1e0/0x2b0 [ 354.623680] ? do_signal+0x1dd/0x2ff0 [ 354.627518] ? prepare_exit_to_usermode+0x2c9/0x4d0 [ 354.632586] do_signal+0x1f3/0x2ff0 [ 354.636267] ? __msan_poison_alloca+0x1e0/0x2b0 [ 354.641032] prepare_exit_to_usermode+0x2c9/0x4d0 [ 354.645953] syscall_return_slowpath+0x123/0x8c0 [ 354.650744] ? recalc_sigpending+0x1a7/0x320 [ 354.655203] ? calculate_sigpending+0xb2/0xd0 [ 354.659748] ? schedule_tail+0x1d0/0x430 [ 354.663845] ? __switch_to+0x473/0x580 [ 354.667771] ? __switch_to_asm+0x34/0x70 [ 354.671872] ret_from_fork+0x15/0x40 [ 354.675649] RIP: 0033:0x459f39 [ 354.678882] Code: Bad RIP value. [ 354.682485] RSP: 002b:00007f23010dfdb0 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 354.690229] RAX: 0000000000000000 RBX: 00007f23010e0700 RCX: 0000000000459f39 [ 354.697615] RDX: 00007f23010e09d0 RSI: 00007f23010dfdb0 RDI: 00000000003d0f00 [ 354.704944] RBP: 0000000000a3fcd0 R08: 00007f23010e0700 R09: 00007f23010e0700 [ 354.712248] R10: 00007f23010e09d0 R11: 0000000000000202 R12: 0000000000000000 [ 354.719549] R13: 0000000000a3fb7f R14: 00007f23010e09c0 R15: 0000000000000004 [ 354.726872] Uninit was stored to memory at: [ 354.731262] kmsan_internal_chain_origin+0x136/0x240 [ 354.736400] __msan_chain_origin+0x6d/0xd0 [ 354.740670] __save_stack_trace+0x8be/0xc60 [ 354.745026] save_stack_trace+0xc6/0x110 [ 354.749123] kmsan_internal_chain_origin+0x136/0x240 [ 354.754261] kmsan_memcpy_origins+0x13d/0x1b0 [ 354.758795] __msan_memcpy+0x6f/0x80 [ 354.762543] pskb_expand_head+0x43b/0x1d20 [ 354.766806] skb_shift+0xcee/0x2d10 [ 354.770463] tcp_sacktag_walk+0x20ff/0x2960 [ 354.774818] tcp_sacktag_write_queue+0x2805/0x4630 [ 354.779784] tcp_ack+0x290e/0x9da0 [ 354.783359] tcp_rcv_established+0x1078/0x2a20 [ 354.787982] tcp_v4_do_rcv+0x686/0xd80 [ 354.791925] tcp_v4_rcv+0x5a33/0x6540 [ 354.795766] ip_local_deliver_finish+0x8cf/0xff0 [ 354.800554] ip_local_deliver+0x44b/0x510 [ 354.804727] ip_rcv+0x6b6/0x740 [ 354.808033] process_backlog+0x82b/0x11e0 [ 354.812209] net_rx_action+0x98f/0x1d50 [ 354.816219] __do_softirq+0x721/0xc5d [ 354.820036] [ 354.821684] Uninit was stored to memory at: [ 354.826049] kmsan_internal_chain_origin+0x136/0x240 [ 354.831196] __msan_chain_origin+0x6d/0xd0 [ 354.835463] __save_stack_trace+0x8be/0xc60 [ 354.839815] save_stack_trace+0xc6/0x110 [ 354.843939] kmsan_internal_chain_origin+0x136/0x240 [ 354.849081] kmsan_memcpy_origins+0x13d/0x1b0 [ 354.853611] __msan_memcpy+0x6f/0x80 [ 354.857352] pskb_expand_head+0x43b/0x1d20 [ 354.861617] skb_shift+0xcee/0x2d10 [ 354.865279] tcp_sacktag_walk+0x20ff/0x2960 [ 354.869633] tcp_sacktag_write_queue+0x2805/0x4630 [ 354.874592] tcp_ack+0x290e/0x9da0 [ 354.878161] tcp_rcv_established+0x1078/0x2a20 [ 354.882768] tcp_v4_do_rcv+0x686/0xd80 [ 354.886684] tcp_v4_rcv+0x5a33/0x6540 [ 354.890518] ip_local_deliver_finish+0x8cf/0xff0 [ 354.895306] ip_local_deliver+0x44b/0x510 [ 354.899486] ip_rcv+0x6b6/0x740 [ 354.902800] process_backlog+0x82b/0x11e0 [ 354.906984] net_rx_action+0x98f/0x1d50 [ 354.910992] __do_softirq+0x721/0xc5d [ 354.914806] [ 354.916454] Uninit was stored to memory at: [ 354.920808] kmsan_internal_chain_origin+0x136/0x240 [ 354.925965] __msan_chain_origin+0x6d/0xd0 [ 354.930232] __save_stack_trace+0x8be/0xc60 [ 354.934587] save_stack_trace+0xc6/0x110 [ 354.938683] kmsan_internal_chain_origin+0x136/0x240 [ 354.943818] kmsan_memcpy_origins+0x13d/0x1b0 [ 354.948346] __msan_memcpy+0x6f/0x80 [ 354.952091] pskb_expand_head+0x43b/0x1d20 [ 354.956355] skb_shift+0xcee/0x2d10 [ 354.960014] tcp_sacktag_walk+0x20ff/0x2960 [ 354.964364] tcp_sacktag_write_queue+0x2805/0x4630 [ 354.969329] tcp_ack+0x290e/0x9da0 [ 354.972933] tcp_rcv_established+0x1078/0x2a20 [ 354.977549] tcp_v4_do_rcv+0x686/0xd80 [ 354.981473] tcp_v4_rcv+0x5a33/0x6540 [ 354.985308] ip_local_deliver_finish+0x8cf/0xff0 [ 354.990100] ip_local_deliver+0x44b/0x510 [ 354.994287] ip_rcv+0x6b6/0x740 [ 354.997597] process_backlog+0x82b/0x11e0 [ 355.001771] net_rx_action+0x98f/0x1d50 [ 355.005781] __do_softirq+0x721/0xc5d [ 355.009598] [ 355.011242] Uninit was stored to memory at: [ 355.015600] kmsan_internal_chain_origin+0x136/0x240 [ 355.020736] __msan_chain_origin+0x6d/0xd0 [ 355.025005] __save_stack_trace+0x8be/0xc60 [ 355.029355] save_stack_trace+0xc6/0x110 [ 355.033450] kmsan_internal_chain_origin+0x136/0x240 [ 355.038586] kmsan_memcpy_origins+0x13d/0x1b0 [ 355.043120] __msan_memcpy+0x6f/0x80 [ 355.046860] pskb_expand_head+0x43b/0x1d20 [ 355.051148] skb_shift+0xcee/0x2d10 [ 355.054806] tcp_sacktag_walk+0x20ff/0x2960 [ 355.059157] tcp_sacktag_write_queue+0x2805/0x4630 [ 355.064118] tcp_ack+0x290e/0x9da0 [ 355.067691] tcp_rcv_established+0x1078/0x2a20 [ 355.072306] tcp_v4_do_rcv+0x686/0xd80 [ 355.076224] tcp_v4_rcv+0x5a33/0x6540 [ 355.080063] ip_local_deliver_finish+0x8cf/0xff0 [ 355.084857] ip_local_deliver+0x44b/0x510 [ 355.089068] ip_rcv+0x6b6/0x740 [ 355.092388] process_backlog+0x82b/0x11e0 [ 355.096570] net_rx_action+0x98f/0x1d50 [ 355.100583] __do_softirq+0x721/0xc5d [ 355.104400] [ 355.106047] Uninit was stored to memory at: [ 355.110405] kmsan_internal_chain_origin+0x136/0x240 [ 355.115545] __msan_chain_origin+0x6d/0xd0 [ 355.119808] __save_stack_trace+0x8be/0xc60 [ 355.124159] save_stack_trace+0xc6/0x110 [ 355.128256] kmsan_internal_chain_origin+0x136/0x240 [ 355.133390] kmsan_memcpy_origins+0x13d/0x1b0 [ 355.137947] __msan_memcpy+0x6f/0x80 [ 355.141694] pskb_expand_head+0x43b/0x1d20 [ 355.145984] skb_shift+0xcee/0x2d10 [ 355.149645] tcp_sacktag_walk+0x20ff/0x2960 [ 355.154003] tcp_sacktag_write_queue+0x2805/0x4630 [ 355.158990] tcp_ack+0x290e/0x9da0 [ 355.162565] tcp_rcv_established+0x1078/0x2a20 [ 355.167180] tcp_v4_do_rcv+0x686/0xd80 [ 355.171101] tcp_v4_rcv+0x5a33/0x6540 [ 355.174969] ip_local_deliver_finish+0x8cf/0xff0 [ 355.179760] ip_local_deliver+0x44b/0x510 [ 355.183963] ip_rcv+0x6b6/0x740 [ 355.187281] process_backlog+0x82b/0x11e0 [ 355.191467] net_rx_action+0x98f/0x1d50 [ 355.195476] __do_softirq+0x721/0xc5d [ 355.199296] [ 355.200968] Uninit was stored to memory at: [ 355.205326] kmsan_internal_chain_origin+0x136/0x240 [ 355.210466] __msan_chain_origin+0x6d/0xd0 [ 355.214740] __save_stack_trace+0x8be/0xc60 [ 355.219097] save_stack_trace+0xc6/0x110 [ 355.223198] kmsan_internal_chain_origin+0x136/0x240 [ 355.228336] kmsan_memcpy_origins+0x13d/0x1b0 [ 355.232865] __msan_memcpy+0x6f/0x80 [ 355.236644] pskb_expand_head+0x43b/0x1d20 [ 355.240929] skb_shift+0xcee/0x2d10 [ 355.244585] tcp_sacktag_walk+0x20ff/0x2960 [ 355.248957] tcp_sacktag_write_queue+0x2805/0x4630 [ 355.253946] tcp_ack+0x290e/0x9da0 [ 355.257513] tcp_rcv_established+0x1078/0x2a20 [ 355.262120] tcp_v4_do_rcv+0x686/0xd80 [ 355.266032] tcp_v4_rcv+0x5a33/0x6540 [ 355.269862] ip_local_deliver_finish+0x8cf/0xff0 [ 355.274672] ip_local_deliver+0x44b/0x510 [ 355.278845] ip_rcv+0x6b6/0x740 [ 355.282152] process_backlog+0x82b/0x11e0 [ 355.286324] net_rx_action+0x98f/0x1d50 [ 355.290320] __do_softirq+0x721/0xc5d [ 355.294133] [ 355.295772] Uninit was stored to memory at: [ 355.300119] kmsan_internal_chain_origin+0x136/0x240 [ 355.305246] __msan_chain_origin+0x6d/0xd0 [ 355.309507] __save_stack_trace+0x8be/0xc60 [ 355.313850] save_stack_trace+0xc6/0x110 [ 355.317969] kmsan_internal_chain_origin+0x136/0x240 [ 355.323098] kmsan_memcpy_origins+0x13d/0x1b0 [ 355.327622] __msan_memcpy+0x6f/0x80 [ 355.331362] pskb_expand_head+0x43b/0x1d20 [ 355.335619] skb_shift+0xcee/0x2d10 [ 355.339271] tcp_sacktag_walk+0x20ff/0x2960 [ 355.343619] tcp_sacktag_write_queue+0x2805/0x4630 [ 355.348660] tcp_ack+0x290e/0x9da0 [ 355.352228] tcp_rcv_established+0x1078/0x2a20 [ 355.356830] tcp_v4_do_rcv+0x686/0xd80 [ 355.360738] tcp_v4_rcv+0x5a33/0x6540 [ 355.364563] ip_local_deliver_finish+0x8cf/0xff0 [ 355.369344] ip_local_deliver+0x44b/0x510 [ 355.373521] ip_rcv+0x6b6/0x740 [ 355.376830] process_backlog+0x82b/0x11e0 [ 355.381007] net_rx_action+0x98f/0x1d50 [ 355.385008] __do_softirq+0x721/0xc5d [ 355.388820] [ 355.390466] Local variable description: ----acpar@ipt_do_table [ 355.396446] Variable was created at: [ 355.400189] ipt_do_table+0x97/0x29d0 [ 355.404016] iptable_security_hook+0xb5/0xe0 21:17:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:17:22 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x0, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x1000004000000010, 0x20000000080802, 0x0) write(r1, &(0x7f0000000000)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) 21:17:22 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x200000002, 0x375, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000440)="6e6d8f3b2778bc732f75") r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r1, &(0x7f00000000c0)="3aabc22d46416c46a7c0b746f8bc85795591f2270d0b19e4926c574bb7e12208339158d5bf3971bda111b62e34e224959ebe5e841814", 0x36, 0x4000, &(0x7f00000001c0)={0xa, 0x4e23, 0x33, @mcast1, 0xd2}, 0x1c) rt_sigtimedwait(&(0x7f0000000340)={0x6}, &(0x7f00000003c0), &(0x7f0000000400)={0x0, 0x1c9c380}, 0x8) socket$inet6(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f000074fffc), 0x348) dup(r2) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x1f9, 0x321) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0x5) sendto$inet6(r2, &(0x7f0000000300), 0x0, 0x20004000, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:17:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000380)=0x80000008) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 21:17:22 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x0, 0x80) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) [ 355.819005] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:17:23 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x2, '\v'}, 0xffff8009) 21:17:23 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 21:17:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000380)=0x80000008) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 21:17:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8910, &(0x7f0000000180)={'ifb0\x00'}) 21:17:23 executing program 5: r0 = socket(0x10, 0x2, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 21:17:23 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x20002, 0x0) epoll_create(0x31) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:17:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:23 executing program 4: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000380)=0x80000008) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 21:17:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:24 executing program 0: 21:17:24 executing program 4: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 21:17:24 executing program 3: 21:17:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000840)="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", 0x741}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:24 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 21:17:24 executing program 5: r0 = socket(0x10, 0x2, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r0, r1, &(0x7f0000000000), 0x80000002) 21:17:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000340), 0x3dc, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0'}, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000080)=""/45, 0x2d}, {&(0x7f00000006c0)}, {&(0x7f00000017c0)=""/4096, 0x3cc}], 0x3, &(0x7f0000000340)=""/220, 0xdc}}], 0x1, 0x0, &(0x7f0000003280)) 21:17:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f00000000c0)=[{0x0, 0x93}], 0x1) 21:17:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000840)="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", 0x741}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000800)="0f0159000f09c462fd31921b000000c4e2e59902421c9d66baf80cb8d817b684ef66bafc0cb000ee66baa00066ed0fc76889650fc7a907000000f0418072e6d7", 0x40}], 0x1, 0x0, &(0x7f0000000840), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:17:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000), 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:25 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 358.284432] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:17:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x87}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 21:17:25 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 21:17:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000), 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:25 executing program 2: 21:17:25 executing program 3: [ 358.680839] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 358.689075] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 358.698128] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 358.705663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 358.885090] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 358.892759] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 358.963037] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 358.970685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 359.037236] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.045154] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 21:17:26 executing program 5: 21:17:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000), 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) [ 359.108553] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.116220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 21:17:26 executing program 3: 21:17:26 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) [ 359.212295] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.219851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 21:17:26 executing program 2: [ 359.362103] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.369677] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 359.432515] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.440118] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 21:17:26 executing program 5: [ 359.533203] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 359.537546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 21:17:26 executing program 3: 21:17:34 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) 21:17:34 executing program 0: 21:17:34 executing program 5: 21:17:34 executing program 2: 21:17:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:34 executing program 3: 21:17:35 executing program 3: 21:17:35 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) 21:17:35 executing program 2: 21:17:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:35 executing program 0: 21:17:35 executing program 5: 21:17:35 executing program 3: 21:17:35 executing program 0: 21:17:35 executing program 5: 21:17:35 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000", 0x18}], 0x1}, 0x0) 21:17:35 executing program 2: 21:17:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:36 executing program 0: 21:17:36 executing program 3: 21:17:36 executing program 5: 21:17:36 executing program 2: 21:17:36 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000", 0x18}], 0x1}, 0x0) 21:17:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:36 executing program 0: 21:17:36 executing program 5: 21:17:36 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000", 0x18}], 0x1}, 0x0) 21:17:36 executing program 0: 21:17:37 executing program 2: 21:17:37 executing program 3: 21:17:37 executing program 5: 21:17:37 executing program 0: 21:17:37 executing program 2: 21:17:37 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000", 0x24}], 0x1}, 0x0) 21:17:37 executing program 3: 21:17:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:37 executing program 5: 21:17:37 executing program 0: 21:17:37 executing program 2: 21:17:37 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000", 0x24}], 0x1}, 0x0) 21:17:38 executing program 3: 21:17:38 executing program 5: 21:17:38 executing program 0: 21:17:38 executing program 2: 21:17:38 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000", 0x24}], 0x1}, 0x0) 21:17:38 executing program 3: 21:17:38 executing program 5: 21:17:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(0x0, &(0x7f0000000040)=[{0x0, 0x93}], 0x1) 21:17:39 executing program 0: 21:17:39 executing program 2: 21:17:39 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867", 0x2a}], 0x1}, 0x0) 21:17:39 executing program 3: 21:17:39 executing program 5: 21:17:39 executing program 3: 21:17:39 executing program 2: 21:17:39 executing program 0: 21:17:39 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867", 0x2a}], 0x1}, 0x0) 21:17:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@local}}}, &(0x7f00000006c0)=0xe8) readv(r0, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 21:17:39 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer2\x00', 0x20002, 0x0) epoll_create(0x31) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) timer_create(0x0, &(0x7f0000ee4000), &(0x7f0000044000)) 21:17:40 executing program 0: 21:17:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040), 0x0) 21:17:40 executing program 2: 21:17:40 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867", 0x2a}], 0x1}, 0x0) 21:17:40 executing program 5: 21:17:40 executing program 5: 21:17:40 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x10000000000003f4, 0x0) 21:17:40 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x9, 0x40002) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 21:17:40 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000", 0x2d}], 0x1}, 0x0) 21:17:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x800) sendfile(r0, r3, &(0x7f0000d83ff8)=0x720, 0x800000000024) 21:17:40 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x100000118) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xfdff}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x200, 0x88) 21:17:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000300)="c1ff0f000000000000e5f700ac14140deb", 0x11}], 0x1}, 0x0) 21:17:41 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000", 0x2d}], 0x1}, 0x0) [ 373.946606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:17:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{}], 0x1) 21:17:41 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000480), 0x10000000000003f4, 0x0) 21:17:41 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc91300010023000000000000005867000000", 0x2d}], 0x1}, 0x0) 21:17:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ifb0\x00'}) 21:17:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(r0, &(0x7f0000000580), 0x3c1) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 21:17:41 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc9130001002300000000000000586700000005", 0x2e}], 0x1}, 0x0) [ 374.752870] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:17:42 executing program 2: clone(0x11102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:17:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/85) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000040)) read$FUSE(r0, &(0x7f0000000500), 0x1000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) [ 375.226311] ptrace attach of "/root/syz-executor2"[9695] was attempted by "/root/syz-executor2"[9696] 21:17:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x1ff, &(0x7f0000000180), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='auxv\x00') preadv(r0, &(0x7f00000017c0), 0xef, 0x0) 21:17:43 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc9130001002300000000000000586700000005", 0x2e}], 0x1}, 0x0) 21:17:43 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x77359400}}, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount(&(0x7f0000000080)=@sr0='/dev/sr0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='gfs2meta\x00', 0x0, &(0x7f0000000380)) 21:17:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000001140)='./file0\x00', 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/24) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000340)={0x6, 0x0, &(0x7f0000000300)="af19060df9f6d83ca25d3283d2c08e7bbe8fa83b3d004e7856ea301743a951a82a7a1c27c21d28acaffb85061a014d78551246688fd7eba64b569f", {0x10001, 0x0, 0x37765f5b, 0x9, 0x1, 0x1, 0xc, 0x33}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "38213aeccf5cc0e9a19146bb0a5d4ea13d18293c6fc0d64aa86942c40cdf1117b4dd11629bbb510271b206e2edba07eaa96934ae6208415e6a9f4245f5eed082", "ce02d76fd25967239ec98c5508b64fc1588377f5a5994cb0ba7a7f3b2b8b26d7fcd5c4e5812f01b8b0a4223b778f735fbcbc24f06bbdedae48e60aa0a5efbc4d", "63556d3d7108597503847a850793363d6cd0dc810ad07cf782e705c272226882"}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000001180)=""/4096) perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffe51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)="6e667300eff16117129ed0598aa8d4", 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) 21:17:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff8}], 0x1) semop(r1, &(0x7f0000000040)=[{}], 0x1) 21:17:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 21:17:43 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x77359400}}, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount(&(0x7f0000000080)=@sr0='/dev/sr0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='gfs2meta\x00', 0x0, &(0x7f0000000380)) [ 376.333301] gfs2: path_lookup on /dev/sr0 returned error -2 21:17:43 executing program 0: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), &(0x7f0000000280), 0x80000001, &(0x7f00005ad000/0x1000)=nil, 0x3) madvise(&(0x7f00003ec000/0x400000)=nil, 0x400000, 0x1000000000008) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000080)) clone(0x0, &(0x7f0000000300), &(0x7f0000000200), &(0x7f00000002c0), &(0x7f0000000000)) mlock(&(0x7f000057f000/0x4000)=nil, 0x4000) 21:17:43 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000567ffffff000d0000000200000001000000ec000cc9130001002300000000000000586700000005", 0x2e}], 0x1}, 0x0) 21:17:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 21:17:43 executing program 5: utimensat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{}, {0x77359400}}, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mount(&(0x7f0000000080)=@sr0='/dev/sr0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='gfs2meta\x00', 0x0, &(0x7f0000000380)) [ 376.570724] gfs2: path_lookup on /dev/sr0 returned error -2 21:17:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000, 0x9effffff00000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@nested={0x8, 0x0, [@generic='\v']}]}, 0x1c}}, 0x0) 21:17:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2b, 0x0, 0x0, 0x0, @loopback, @remote}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000080)) 21:17:44 executing program 5: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000003c0)) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x89, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x5) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00', 0x52}) [ 376.919358] gfs2: path_lookup on /dev/sr0 returned error -2 21:17:44 executing program 3: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000003c0)) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000009c0), 0x89, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x5) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) [ 376.969955] ================================================================== [ 376.977422] BUG: KMSAN: uninit-value in tipc_nl_compat_dumpit+0x478/0x820 [ 376.984382] CPU: 1 PID: 9742 Comm: syz-executor2 Not tainted 4.19.0+ #77 [ 376.991247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.000623] Call Trace: [ 377.003250] dump_stack+0x32d/0x480 [ 377.006930] ? tipc_nl_compat_dumpit+0x478/0x820 [ 377.011740] kmsan_report+0x1a2/0x2e0 [ 377.015586] __msan_warning+0x74/0xd0 [ 377.019440] tipc_nl_compat_dumpit+0x478/0x820 [ 377.024058] ? kmsan_set_origin+0x83/0x130 [ 377.028334] tipc_nl_compat_recv+0x1410/0x2770 [ 377.032963] ? __msan_get_context_state+0x9/0x30 [ 377.037773] ? tipc_nl_node_reset_link_stats+0x5d0/0x5d0 [ 377.043265] ? tipc_nl_compat_bearer_disable+0x360/0x360 [ 377.048754] ? tipc_netlink_compat_stop+0x40/0x40 [ 377.053629] genl_rcv_msg+0x185c/0x1a20 [ 377.057671] ? kmsan_set_origin+0x83/0x130 [ 377.061954] netlink_rcv_skb+0x394/0x640 [ 377.066057] ? genl_unbind+0x390/0x390 [ 377.070006] genl_rcv+0x63/0x80 [ 377.073325] netlink_unicast+0x1699/0x1740 [ 377.077618] ? genl_pernet_exit+0x90/0x90 [ 377.081816] netlink_sendmsg+0x13c7/0x1440 [ 377.086128] ___sys_sendmsg+0xe68/0x1250 [ 377.090226] ? netlink_getsockopt+0x16b0/0x16b0 [ 377.094990] ? __fdget+0x329/0x440 [ 377.098580] __se_sys_sendmsg+0x305/0x460 [ 377.102789] __x64_sys_sendmsg+0x4a/0x70 [ 377.106900] do_syscall_64+0xcf/0x110 [ 377.110737] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 377.115952] RIP: 0033:0x457569 [ 377.119177] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.138118] RSP: 002b:00007f00a82eec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.145872] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 377.153182] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 377.160479] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 377.167774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00a82ef6d4 [ 377.175068] R13: 00000000004c3aee R14: 00000000004d5bd8 R15: 00000000ffffffff [ 377.182380] [ 377.184026] Uninit was created at: [ 377.187604] kmsan_internal_poison_shadow+0xc8/0x1e0 [ 377.192741] kmsan_kmalloc+0x98/0x110 [ 377.196576] kmsan_slab_alloc+0xe/0x10 [ 377.200493] __kmalloc_node_track_caller+0xf62/0x14e0 [ 377.205715] __alloc_skb+0x42b/0xeb0 [ 377.209456] netlink_sendmsg+0xc9e/0x1440 [ 377.213639] ___sys_sendmsg+0xe68/0x1250 [ 377.217728] __se_sys_sendmsg+0x305/0x460 [ 377.221913] __x64_sys_sendmsg+0x4a/0x70 [ 377.226006] do_syscall_64+0xcf/0x110 [ 377.229855] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 377.235083] ================================================================== [ 377.242455] Disabling lock debugging due to kernel taint [ 377.247929] Kernel panic - not syncing: panic_on_warn set ... [ 377.247929] [ 377.255337] CPU: 1 PID: 9742 Comm: syz-executor2 Tainted: G B 4.19.0+ #77 [ 377.263595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.272977] Call Trace: [ 377.275596] dump_stack+0x32d/0x480 [ 377.279270] panic+0x57e/0xb28 [ 377.282554] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 377.288048] kmsan_report+0x2d3/0x2e0 [ 377.291905] __msan_warning+0x74/0xd0 [ 377.295749] tipc_nl_compat_dumpit+0x478/0x820 [ 377.300370] ? kmsan_set_origin+0x83/0x130 [ 377.304668] tipc_nl_compat_recv+0x1410/0x2770 [ 377.309292] ? __msan_get_context_state+0x9/0x30 [ 377.314107] ? tipc_nl_node_reset_link_stats+0x5d0/0x5d0 [ 377.319584] ? tipc_nl_compat_bearer_disable+0x360/0x360 [ 377.325073] ? tipc_netlink_compat_stop+0x40/0x40 [ 377.329944] genl_rcv_msg+0x185c/0x1a20 [ 377.333988] ? kmsan_set_origin+0x83/0x130 [ 377.338262] netlink_rcv_skb+0x394/0x640 [ 377.342352] ? genl_unbind+0x390/0x390 [ 377.346284] genl_rcv+0x63/0x80 [ 377.349601] netlink_unicast+0x1699/0x1740 [ 377.353908] ? genl_pernet_exit+0x90/0x90 [ 377.358102] netlink_sendmsg+0x13c7/0x1440 [ 377.362407] ___sys_sendmsg+0xe68/0x1250 [ 377.366497] ? netlink_getsockopt+0x16b0/0x16b0 [ 377.371241] ? __fdget+0x329/0x440 [ 377.374822] __se_sys_sendmsg+0x305/0x460 [ 377.379027] __x64_sys_sendmsg+0x4a/0x70 [ 377.383121] do_syscall_64+0xcf/0x110 [ 377.386958] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 377.392170] RIP: 0033:0x457569 [ 377.395386] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.414336] RSP: 002b:00007f00a82eec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.422087] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 377.429389] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 377.436687] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 377.443982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00a82ef6d4 [ 377.451277] R13: 00000000004c3aee R14: 00000000004d5bd8 R15: 00000000ffffffff [ 377.459670] Kernel Offset: disabled [ 377.463308] Rebooting in 86400 seconds..