000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3a99e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1820.268460][T23927] device bridge1329 entered promiscuous mode [ 1820.390077][T23932] Unknown ioctl 1074287107 [ 1820.391143][T23929] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1820.427754][T23934] Unknown ioctl 1074287107 [ 1820.486324][T23929] device bridge1329 left promiscuous mode 18:11:31 executing program 4: syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f000000b680)={&(0x7f000000b340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f000000b640)={&(0x7f000000b380)={0xfc, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @local, 0x421e}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xaebf, @mcast1, 0xdd0}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x8004) ioctl$TIOCNXCL(r1, 0x540d) socket(0x2, 0x1, 0x0) 18:11:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0xa000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x5865) 18:11:31 executing program 4: syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f000000b680)={&(0x7f000000b340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f000000b640)={&(0x7f000000b380)={0xfc, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @local, 0x421e}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xaebf, @mcast1, 0xdd0}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x8004) ioctl$TIOCNXCL(r1, 0x540d) socket(0x2, 0x1, 0x0) [ 1820.865261][T23949] device bridge1096 entered promiscuous mode 18:11:31 executing program 1: syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r1, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00'], 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f000000b680)={&(0x7f000000b340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f000000b640)={&(0x7f000000b380)={0xfc, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @local, 0x421e}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xaebf, @mcast1, 0xdd0}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x8004) ioctl$TIOCNXCL(r1, 0x540d) socket(0x2, 0x1, 0x0) [ 1820.951907][T23950] device bridge1330 entered promiscuous mode [ 1821.034217][T23951] device bridge_slave_0 left promiscuous mode [ 1821.058285][T23951] bridge1329: port 1(bridge_slave_0) entered disabled state 18:11:31 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x400000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) socket(0x840000000002, 0x3, 0x6) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r1, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1821.164683][T23951] bridge1330: port 1(bridge_slave_0) entered blocking state [ 1821.225778][T23951] bridge1330: port 1(bridge_slave_0) entered disabled state 18:11:31 executing program 1: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) semget$private(0x0, 0x403, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) setns(r0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000240), 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) [ 1821.278215][T23951] device bridge_slave_0 entered promiscuous mode [ 1821.299868][T23951] bridge1330: port 1(bridge_slave_0) entered blocking state [ 1821.307380][T23951] bridge1330: port 1(bridge_slave_0) entered forwarding state [ 1821.417833][T23952] device bridge_slave_0 left promiscuous mode [ 1821.438246][T23952] bridge1095: port 1(bridge_slave_0) entered disabled state [ 1821.545623][T23952] bridge1096: port 1(bridge_slave_0) entered blocking state [ 1821.582384][T23952] bridge1096: port 1(bridge_slave_0) entered disabled state 18:11:32 executing program 1: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) semget$private(0x0, 0x403, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) setns(r0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000240), 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) [ 1821.618284][T23952] device bridge_slave_0 entered promiscuous mode [ 1821.681362][T23952] bridge1096: port 1(bridge_slave_0) entered blocking state [ 1821.688819][T23952] bridge1096: port 1(bridge_slave_0) entered forwarding state 18:11:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6000) 18:11:32 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d5c99e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:32 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x403, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) setns(r1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) write$char_usb(0xffffffffffffffff, 0x0, 0x0) 18:11:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0xc000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1822.104049][T24182] device bridge1331 entered promiscuous mode [ 1822.193341][T24186] device bridge_slave_0 left promiscuous mode [ 1822.222534][T24186] bridge1330: port 1(bridge_slave_0) entered disabled state 18:11:32 executing program 4: unshare(0x8020000) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x403, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) setns(r1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:11:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0xff00, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f90a, 0x78, [], @p_u8=&(0x7f00000000c0)}}) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0185649, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') sendfile(r3, r4, 0x0, 0x320f) ioctl$EVIOCSFF(r4, 0x402c4580, &(0x7f0000000000)={0x0, 0xfff, 0x100, {0x0, 0x2}, {0x0, 0x40}, @const={0x0, {0x8, 0x5, 0xc27, 0xfffb}}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = dup2(r0, r5) setsockopt$inet6_int(r6, 0x29, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, 0x0) write$RDMA_USER_CM_CMD_BIND(r7, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r8, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110600, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r2}}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket(0xdbcb217dfeb65177, 0x1, 0x8) [ 1822.317505][T24186] bridge1331: port 1(bridge_slave_0) entered blocking state [ 1822.338014][T24186] bridge1331: port 1(bridge_slave_0) entered disabled state [ 1822.379448][T24186] device bridge_slave_0 entered promiscuous mode [ 1822.417837][T24186] bridge1331: port 1(bridge_slave_0) entered blocking state [ 1822.425187][T24186] bridge1331: port 1(bridge_slave_0) entered forwarding state 18:11:33 executing program 4: unshare(0x8020000) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x403, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semtimedop(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) setns(r1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1822.537501][T24192] device bridge1097 entered promiscuous mode [ 1822.585636][T24182] validate_nla: 2 callbacks suppressed [ 1822.585648][T24182] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x0, r2, 0x0, [0x7]}) [ 1822.649870][T24182] device bridge1331 left promiscuous mode [ 1822.695519][T24195] device bridge_slave_0 left promiscuous mode [ 1822.703519][T24195] bridge1096: port 1(bridge_slave_0) entered disabled state [ 1822.766652][T24195] bridge1097: port 1(bridge_slave_0) entered blocking state 18:11:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xca, 0x0, 0x0) [ 1822.848514][T24195] bridge1097: port 1(bridge_slave_0) entered disabled state [ 1822.900913][T24195] device bridge_slave_0 entered promiscuous mode [ 1822.938975][T24195] bridge1097: port 1(bridge_slave_0) entered blocking state [ 1822.946328][T24195] bridge1097: port 1(bridge_slave_0) entered forwarding state 18:11:33 executing program 1: r0 = memfd_create(&(0x7f0000000300), 0x0) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x0, @remote, 0x0, 0x0, 'lblcr\x00'}, 0x2c) [ 1822.998498][T24196] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:33 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000180)={0x0, @reserved}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x60000, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88002012}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x8000) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90010}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022cbd7000ffc53f020c0000000800020002000000080002000c2500000800020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0x5) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000002c0)={0x0, @reserved}) 18:11:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r0, r1, 0x0) dup2(r3, r2) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup3(0xffffffffffffffff, r5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 1823.184449][T24312] device bridge1331 entered promiscuous mode [ 1823.210361][T24316] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1823.222386][T24316] device bridge1331 left promiscuous mode [ 1823.250083][T24195] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6558) 18:11:33 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10010, 0x0) 18:11:33 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e32599f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0xe000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:34 executing program 3: mkdir(&(0x7f0000000240)='./bus\x00', 0x4) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3ac0427de7ddf710}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000001c0)=0x7, r2, 0x0, 0x0, 0x1}}, 0xfffffffffffffe11) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='overlay\x00', 0x800000, &(0x7f0000000140)=ANY=[@ANYRES16=r1, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES64]]) [ 1823.596601][T24695] device bridge1332 entered promiscuous mode 18:11:34 executing program 1: unshare(0x8020000) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={{0x0, 0x0, @descriptor="01d17abb11615689"}}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000180)={0x3}) writev(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x4e21, @broadcast}}) setns(r1, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000100)={0xdfb, "9dc377f2d32c52c59e344bb643b7e7f27752b5fbd28674415bfa9b4b2bc5f511", 0x1000, 0x4, 0x5}) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) 18:11:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0xaaaaaaaaaaaacba, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x80000000], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1823.716334][T24756] overlayfs: unrecognized mount option "" or missing value [ 1823.725619][T24749] device bridge1098 entered promiscuous mode [ 1823.800536][T24750] device bridge_slave_0 left promiscuous mode [ 1823.811623][T24750] bridge1331: port 1(bridge_slave_0) entered disabled state 18:11:34 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80040, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:34 executing program 1: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000440)={"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"}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(0xffffffffffffffff, 0xc1004111, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0xb, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 1823.902452][T24750] bridge1332: port 1(bridge_slave_0) entered blocking state [ 1823.923973][T24750] bridge1332: port 1(bridge_slave_0) entered disabled state [ 1823.933262][T24750] device bridge_slave_0 entered promiscuous mode [ 1823.962138][T24966] kvm [24813]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc1 data 0xfffffffc [ 1823.974743][T24750] bridge1332: port 1(bridge_slave_0) entered blocking state [ 1823.982086][T24750] bridge1332: port 1(bridge_slave_0) entered forwarding state [ 1823.994939][T24966] kvm [24813]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc1 data 0x0 [ 1824.006867][T24966] kvm [24813]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc1 data 0x0 [ 1824.027752][T24751] device bridge_slave_0 left promiscuous mode [ 1824.039876][T24966] kvm [24813]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc1 data 0x0 [ 1824.059797][T24751] bridge1097: port 1(bridge_slave_0) entered disabled state [ 1824.137568][T24751] bridge1098: port 1(bridge_slave_0) entered blocking state [ 1824.151894][T24751] bridge1098: port 1(bridge_slave_0) entered disabled state [ 1824.172377][T24751] device bridge_slave_0 entered promiscuous mode 18:11:34 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00280593bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bb77bf723be80699ab51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a70a452827f36c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8973841c157945f7ea2aeba088227b92e995e037bde20c8ceb6039d7a01bc3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76efbeb16e3e4fd678792d290e73cb5ac591910dbf112f906d369c82e39adc1b159b8f5b6670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360832f5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d60015505000000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a18265955cf6bfae3108c5fa5c85e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c798521470206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec621591932769d4bbf6d56531c9afa8a87891761d5db8f71ccbe2c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fdaae710f44d6420d9ca76e670db7157eb39645334db2c27985f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da128cf9c71ba39b7a98f7c75929e831a0195afcc40176459cfb86f7ec8f8a69e65d38ab13ac24800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a9ca929d355989f6a6eee666d55c987e40ba129fb8b9c42237e2a948a07176e81968dc902b0a8aa12a"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) connect$pppl2tp(r2, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @loopback}, 0x4, 0x0, 0x2, 0x7ff}}, 0xfffffffffffffdc1) ioctl$PPPIOCSMRU(r0, 0x40047452, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r3 = socket(0x3678ae25344d4a04, 0x3, 0x77) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000100)=0x8) [ 1824.195902][T24751] bridge1098: port 1(bridge_slave_0) entered blocking state [ 1824.203244][T24751] bridge1098: port 1(bridge_slave_0) entered forwarding state [ 1824.257030][T24755] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1824.295507][T24695] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1824.328561][T24695] device bridge1332 left promiscuous mode [ 1824.412109][T24752] device bridge1332 entered promiscuous mode [ 1824.423888][T24755] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1824.442375][T24695] device bridge_slave_0 left promiscuous mode 18:11:35 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2e6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1824.463238][T24695] bridge1332: port 1(bridge_slave_0) entered disabled state [ 1824.497294][T25084] kvm [24813]: vcpu0, guest rIP: 0x48 disabled perfctr wrmsr: 0xc2 data 0x100b6ce4d 18:11:35 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) connect$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x0, @empty}}, 0x1e) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)=ANY=[@ANYRES64=0x0], 0x8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$P9_RGETATTR(r3, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) r4 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x100c1, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r5, 0x4140, 0x0) write$binfmt_elf64(r4, &(0x7f0000000800)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00280593bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bb77bf723be80699ab51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a70a452827f36c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8973841c157945f7ea2aeba088227b92e995e037bde20c8ceb6039d7a01bc3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76efbeb16e3e4fd678792d290e73cb5ac591910dbf112f906d369c82e39adc1b159b8f5b6670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360832f5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d60015505000000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a18265955cf6bfae3108c5fa5c85e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c798521470206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec621591932769d4bbf6d56531c9afa8a87891761d5db8f71ccbe2c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fdaae710f44d6420d9ca76e670db7157eb39645334db2c27985f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da128cf9c71ba39b7a98f7c75929e831a0195afcc40176459cfb86f7ec8f8a69e65d38ab13ac24800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a9ca929d355989f6a6eee666d55c987e40ba129fb8b9c42237e2a948a07176e81968dc902b0a8aa12a"], 0x3c) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r6 = dup(r4) write$P9_RGETATTR(r6, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x7ff, 0x10}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000200)={r7, 0x9df}, &(0x7f00000002c0)=0x8) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1824.525970][T25081] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6800) 18:11:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0xf000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x0, 'dh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x0, 0x0) 18:11:35 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x3ba}, 0x7) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="1f06bfb8", 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 1824.863017][T25172] device bridge1099 entered promiscuous mode 18:11:35 executing program 1: ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000440)={"fce2e61f24139d207d8f9044ebb4412824b546a7cae67040b96d07c85fb5a6a3e6cb0e566e005e8a1267df8dc71391d6098187fdbe04a5250521729a51d8948696fc82067f2ba81c9cc2043130b2e9a49252f47a70aaacee2133a8a770cf5e421b3c1a3d51101c52188ddf63df0f845f8e904261ceab8c47a09ab150ae4d14eacea2fc6f00fd82a91aa9bf6dbfc2fc2ca4d85eeed7f95b6fa0b0f691b3ec1cea5da8ed53a53bf5b2df77153500f333f44d560e6745e0852b116e4ddd65d6cd9c10286c430ef76812ee42ddee32dce927e7e4cd837efd878e615e7d0949c88e0125aee65b656da87342a051e0593fb0755378ea8b6e29292fa2572e49c720a0139dfa2026a10d54e41e1796db71596d373afe30e0c65b7f0ff10e61cf590e5a9f9c539cccd507b8b98feec2c5ed49064f0b2f5e219fdedeac2aebced35da99c5eed5421064158c17b39bca3a0301cf808da6a089dcd8bf4f292ca7b3cfec204458e0ec2b8ed1e9279d1c6d0f84ce287a1e187e691247e651db7f93497f9158f728a31158e49f69e42e22b0c8766835327243fff0816f96d54e2198b2f736f7b65d7184ba0f403f4f3fd23ffb7b794f9fed173008d6cb8832ce14580e1bd2208570a5ba43c3bea167a359d8d6e03918d0d4d0cdd0f2e8fa176244e6482a717508fe193049c630ada92a135e35b6681a65ca436fada47e0b99068f4e41d1ecb21e3cc6979e1e82b280d4f1d8acce070d59218ed540436350997fb204808779e2855575cb563779f448c0df9cc81fbab9d6d2a6439a095142c721e02ab64396cce90f8f4d3e18f915be7e5fdc5d0a18efe838e3838b5639bdae59a6f611b18a7a8f4ebc1892cb16aac7181230e67f140eb29fad5b68d9e5d5e4ce6d88f2faef3856e6defde5592820978849686fbab8aeb99f3122fd493ee1ca36354c55e60fb09ea24a6457f34be160a16e74abbe15d140eb7cc93bc4ba0f21627a6cb6f8615d7143becb1529e880a9bb9c0a85ff0428296e84dbd72e8c732b615e7ed3cbc177c5bb0497bde0db038bc1fe4bc2445a344f5673f82db95bf7a7a4398c79747826c030592899f153d9299077e2ae41151c06e3adbd0bec26e573a7c9cfbf0a3ad0ce5bb843063fb9f48f8dad80e7ae461c60f3a24e03361ff2ea5eb8b02154989acc21c11bf9f0e3d876f1270e204a3eae22108e280420ab9c1fe3e13478cf142a29c7dae5fdac2b880f9fd314ad37585dfe2f31ba1508731799d80e3f368754bdf887c97a18b955616ee3aa99e7c79b442909ecc107e33702e33645269e4a547e9d9ee1519712c556a556006f5f67b5804e4552c44130a28b1a9d49223497ee6a2a31c7a8580dadd1ac3dcf79f17510eb7b89c227dd5d104a6c295ee58a17580b40dc8fddb0769860a14e1226f54c00f3fa19bb05291d87a041bd6ab132f93c0091b"}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(0xffffffffffffffff, 0xc1004111, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0xb, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 18:11:35 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r5, 0x1, 0x1, 0x48}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r7, 0x1, 0x1, 0x48}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r9, 0x1, 0x1, 0x48}}, 0x20) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r10, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r11, 0x1, 0x1, 0x48}}, 0x20) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='lowerdir=./buc,workdir=./file1,upperdir=./file0', @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0, @ANYRES64=r5, @ANYRESOCT=0x0, @ANYPTR64, @ANYPTR], @ANYRESHEX=0x0], @ANYBLOB="a8eb99fe09b659e6bddd25c299b680ca391c2a493dd4bb00b58c6318d358ba8e587fe665f7800031d8d4d7e7441f0b8571cc687873a1d5ac90b824efd5c93e98930a517c18224c7760c07c6127c9b6de0825a83db731020f084e37060c8f714f13db60a12b9fc3dcbcf0c9798aa096098bc0d1fbd1ce88790abbf01da58df687971113e8e04450a172059cfd2bfc584470c5c6d82ceaa85c3f5c8e", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES16, @ANYRES64=r2], @ANYRESOCT=r5, @ANYBLOB="7f0922477e2fc8abbaee89b467cc48c153e8238ca769eb66df1c62ec7d740b9e66e902ffe83767b23330aa50778ca31706d933d707c76faf4742177fe28e0308d1f504dd08c731de991b239751f0174248d11d855089ceb302892139e4479824b162d853896123317f8965a9d5f3d9cde94d727cfb720b3aee1ee5af1517f11319ce56a8a9c2f152ac07100127921877ed4bb26f41b796761107d27f18", @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES32=r6, @ANYRES32=r8], @ANYRESHEX=r10, @ANYRES16, @ANYRES16=0x0]]) [ 1824.922660][T25220] device bridge_slave_0 left promiscuous mode [ 1824.943220][T25220] bridge1098: port 1(bridge_slave_0) entered disabled state [ 1825.025662][T25220] bridge1099: port 1(bridge_slave_0) entered blocking state [ 1825.065412][ T27] audit: type=1804 audit(1579284695.535:20286): pid=25231 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir407591635/syzkaller.tpzf6F/2359/bus" dev="sda1" ino=16914 res=1 [ 1825.088116][T25220] bridge1099: port 1(bridge_slave_0) entered disabled state [ 1825.107015][T25220] device bridge_slave_0 entered promiscuous mode [ 1825.120185][T25220] bridge1099: port 1(bridge_slave_0) entered blocking state [ 1825.127562][T25220] bridge1099: port 1(bridge_slave_0) entered forwarding state [ 1825.169363][T25221] device bridge1334 entered promiscuous mode [ 1825.193068][T25222] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1825.217541][T25234] overlayfs: failed to resolve './file0€': -2 [ 1825.233198][T25224] bridge1334: port 1(bridge_slave_0) entered blocking state [ 1825.243342][T25224] bridge1334: port 1(bridge_slave_0) entered disabled state [ 1825.257479][T25224] device bridge_slave_0 entered promiscuous mode [ 1825.267511][T25224] bridge1334: port 1(bridge_slave_0) entered blocking state [ 1825.274858][T25224] bridge1334: port 1(bridge_slave_0) entered forwarding state [ 1825.303414][T25233] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1825.314020][T25233] device bridge1334 left promiscuous mode 18:11:35 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)) [ 1825.380956][T25221] device bridge1334 entered promiscuous mode [ 1825.395191][ T27] audit: type=1804 audit(1579284695.865:20287): pid=25236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir407591635/syzkaller.tpzf6F/2359/bus" dev="sda1" ino=16914 res=1 [ 1825.404220][T25224] device bridge1334 left promiscuous mode 18:11:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x10000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:36 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac306a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) 18:11:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6c00) [ 1825.662065][T25354] device bridge1100 entered promiscuous mode 18:11:36 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0x110, 0x220, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000040), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@dev={[], 0x28}, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x5, 0xd}}}, {{@arp={@rand_addr=0x8, @empty, 0xffffffff, 0xffffff00, 0x4, 0x8, {@mac, {[0x7f, 0x0, 0xff, 0x101, 0xff, 0xff]}}, {@empty, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x93f6, 0x2, 0x3, 0x1, 0x9f, 0x20, 'ip6_vti0\x00', 'tunl0\x00', {0xff}, {}, 0x0, 0x80}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xf, 0xffffffff}}}, {{@arp={@multicast2, @multicast2, 0xffffff00, 0xff000000, 0x10, 0x2, {@mac=@remote, {[0x0, 0x54da6847a7d95271, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0x0, 0xff, 0x0, 0xff]}}, 0xecd, 0xfff, 0x9e82, 0x2, 0x5, 0x2, 'vlan0\x00', 'ip_vti0\x00', {0xff}, {}, 0x0, 0x201}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x110}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f776572643d2e2f66696c65312c75707065726469723d2e2f66696c6530000000d68607d07b84d422909900000000000000000000000000201796a11033066fbcea851ea634463cbb12d96d1f9a2d0d5e115b8e757a422d77c5aa95a743f307a38d330335ba20a984c984c6a1a2ab9155973f865dcd"]) [ 1825.718852][T25401] device bridge_slave_0 left promiscuous mode [ 1825.743486][T25401] bridge1099: port 1(bridge_slave_0) entered disabled state 18:11:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0xaaaaaaaaaaaacba, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f0000000100)=0x10) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x80000000], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1825.802391][T25401] bridge1100: port 1(bridge_slave_0) entered blocking state [ 1825.818895][T25401] bridge1100: port 1(bridge_slave_0) entered disabled state [ 1825.847865][T25401] device bridge_slave_0 entered promiscuous mode [ 1825.893882][T25401] bridge1100: port 1(bridge_slave_0) entered blocking state [ 1825.901263][T25401] bridge1100: port 1(bridge_slave_0) entered forwarding state 18:11:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x600, 0x0, 0x0, 0x0, [0x0, 0x9]}}, 0xfdef) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000100)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 1826.043079][T25536] overlayfs: unrecognized mount option "lowerd=./file1" or missing value [ 1826.086406][T25466] device bridge1335 entered promiscuous mode 18:11:36 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e376275fb2c776f726b6469723d2e2f66696c65312c75707065726469723d2e2fe6696c653012c29dddc8cda56b0b81a99ecbe46e5065c8ad1e14b6b539a9afa1ad0c0df182f5cc482e9b0329d6a4ef622f9e25847af0201c6089720e80f90f6b1cfc829626f191469242573227c67ecb9fdf76d77bf3eb28582aaf382e09b9af58d7f23a6732a0f7ff6a59b5bab324280143ff3b270995c43715bf0c73817dce7210875a00e321a1389fe62dd6ea1cc129927a0f0f8efc27237e4587fd0d359048fac119c313c327b20a40aaabace47f8cc102a89238339b8eb4e914a422b2c5d13bfa4ea890f32f31e307bd5f714d386292d641219ea0da62f0e0e14f33"]) 18:11:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x0, 'dh\x00'}, 0x2c) [ 1826.159229][T25469] device bridge_slave_0 left promiscuous mode [ 1826.204583][T25469] bridge1334: port 1(bridge_slave_0) entered disabled state 18:11:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_bulk={0x4, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1826.335217][T25469] bridge1335: port 1(bridge_slave_0) entered blocking state 18:11:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x0, 'dh\x00'}, 0x2c) [ 1826.396667][T25789] overlayfs: failed to resolve './æile0ÂÝÈÍ¥k ©žËänPeÈ­¶µ9©¯¡­ ñ‚õÌH.›)Ö¤ïb/ž%„zð `‰r€ùkü‚–&ñ‘F’BW2'Æ~ËŸßv×{óë(X*¯8. ¹¯X×ò:g2 ÷ÿjYµº³$(Cÿ;' •Ä7¿ s}Îr‡Z': -2 [ 1826.419067][T25469] bridge1335: port 1(bridge_slave_0) entered disabled state [ 1826.445778][T25469] device bridge_slave_0 entered promiscuous mode [ 1826.451716][T25793] usb usb2: usbfs: process 25793 (syz-executor.4) did not claim interface 0 before use [ 1826.479017][T25469] bridge1335: port 1(bridge_slave_0) entered blocking state [ 1826.486341][T25469] bridge1335: port 1(bridge_slave_0) entered forwarding state 18:11:37 executing program 3: mkdir(&(0x7f00000000c0)='./file1\x00', 0x110) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getpeername(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000040)=0x80) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}}, 0xa0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000140)={0xfff, 0x7}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f00000002c0)={0x0, 0x1, {0xd2f38c12e7ccad01, 0x1, 0x7, 0x1, 0x7}, 0x10000}) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1826.594388][T25558] device bridge1335 left promiscuous mode 18:11:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x1f000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1826.748133][T25466] device bridge1335 entered promiscuous mode 18:11:37 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac3a6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4020aeb2, &(0x7f0000000000)={0x0, r2}) [ 1826.833469][T25558] device bridge1335 left promiscuous mode 18:11:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7400) 18:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x0, 'dh\x00'}, 0x2c) 18:11:37 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x34d, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800290000000100"], 0x30}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0x5) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xec52430be5b05911, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0x6000, 0x1c000, 0x2], 0x9, 0x0, 0x3}) syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x9f07}]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140)=0x4, 0x4) bind(r0, &(0x7f00000001c0)=@x25={0x9, @null=' \x00'}, 0x80) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1826.917852][T25911] device bridge1101 entered promiscuous mode [ 1826.973743][T25916] device bridge_slave_0 left promiscuous mode [ 1826.982249][T25916] bridge1100: port 1(bridge_slave_0) entered disabled state 18:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x0, 'dh\x00'}, 0x2c) 18:11:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/223, 0xdf}], 0x1, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0xfffffe2c, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001cc0), 0x1006) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) [ 1827.098884][T25916] bridge1101: port 1(bridge_slave_0) entered blocking state [ 1827.123677][T25916] bridge1101: port 1(bridge_slave_0) entered disabled state [ 1827.144474][T25916] device bridge_slave_0 entered promiscuous mode [ 1827.154386][T25916] bridge1101: port 1(bridge_slave_0) entered blocking state [ 1827.161713][T25916] bridge1101: port 1(bridge_slave_0) entered forwarding state 18:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x6, @multicast2, 0x0, 0x1000000, 'dh\x00'}, 0x2c) [ 1827.244056][T25924] device bridge1336 entered promiscuous mode [ 1827.311566][T25928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:11:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x78, 0x0, 0x0) r5 = dup2(r2, r4) dup3(r5, r3, 0x0) [ 1827.353966][T25928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1827.371142][T25928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 18:11:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 1827.576360][T25930] device bridge_slave_0 left promiscuous mode [ 1827.585153][T25930] bridge1335: port 1(bridge_slave_0) entered disabled state 18:11:38 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x2880408, &(0x7f0000000100)=ANY=[@ANYRESOCT]) [ 1827.645760][T25930] bridge1336: port 1(bridge_slave_0) entered blocking state [ 1827.664180][T25930] bridge1336: port 1(bridge_slave_0) entered disabled state [ 1827.702467][T25930] device bridge_slave_0 entered promiscuous mode [ 1827.711003][T25930] bridge1336: port 1(bridge_slave_0) entered blocking state [ 1827.718320][T25930] bridge1336: port 1(bridge_slave_0) entered forwarding state [ 1827.774091][T26035] validate_nla: 7 callbacks suppressed [ 1827.774112][T26035] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1827.803347][T26036] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1827.822796][T26036] device bridge1336 left promiscuous mode 18:11:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x20000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1827.931099][T25930] device bridge1336 entered promiscuous mode 18:11:38 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac5c6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x6, 0x4) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0xc6000000, 0x0}}], 0xc6, 0x24000000) [ 1828.016365][T25924] device bridge_slave_0 left promiscuous mode [ 1828.037908][T25924] bridge1336: port 1(bridge_slave_0) entered disabled state [ 1828.112604][T26036] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7a00) 18:11:38 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x98) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) 18:11:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x13, 0x0, 0x0) r5 = dup2(r2, r4) dup3(r5, r3, 0x0) [ 1828.255589][T26362] device bridge1102 entered promiscuous mode [ 1828.314542][T26478] sd 0:0:1:0: device reset 18:11:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1828.346895][T26364] device bridge_slave_0 left promiscuous mode [ 1828.366755][T26364] bridge1101: port 1(bridge_slave_0) entered disabled state [ 1828.417979][T26364] bridge1102: port 1(bridge_slave_0) entered blocking state 18:11:38 executing program 3: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000001c0)={0x401, 0xa, 0x4, 0x20, 0x7fff, {}, {0x8, 0x1, 0x3f, 0x8, 0x40, 0x4, "c3f97e54"}, 0x7f, 0x3, @fd, 0x7, 0x0, 0xffffffffffffffff}) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040), 0x4) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:39 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1828.480493][T26364] bridge1102: port 1(bridge_slave_0) entered disabled state [ 1828.495156][T26685] sd 0:0:1:0: device reset [ 1828.506344][T26364] device bridge_slave_0 entered promiscuous mode [ 1828.561418][T26364] bridge1102: port 1(bridge_slave_0) entered blocking state [ 1828.568757][T26364] bridge1102: port 1(bridge_slave_0) entered forwarding state [ 1828.634662][T26368] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1828.666445][T26691] sd 0:0:1:0: device reset 18:11:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd(0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_buf(r0, 0x0, 0x3, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) [ 1828.746771][T26481] device bridge1338 entered promiscuous mode 18:11:39 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1828.802376][T26577] bridge1338: port 1(bridge_slave_0) entered blocking state [ 1828.845269][T26577] bridge1338: port 1(bridge_slave_0) entered disabled state [ 1828.864569][T26577] device bridge_slave_0 entered promiscuous mode [ 1828.893272][T26577] bridge1338: port 1(bridge_slave_0) entered blocking state [ 1828.900637][T26577] bridge1338: port 1(bridge_slave_0) entered forwarding state [ 1828.940282][T26687] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1828.945101][T26902] sd 0:0:1:0: device reset [ 1828.961771][T26687] device bridge1338 left promiscuous mode [ 1829.012994][T26364] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1829.113129][T26577] device bridge1338 entered promiscuous mode 18:11:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3f000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:39 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 18:11:39 executing program 4: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1829.163240][T26481] device bridge_slave_0 left promiscuous mode [ 1829.173486][T26481] bridge1338: port 1(bridge_slave_0) entered disabled state [ 1829.331919][T26687] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1829.417965][T26937] device bridge1103 entered promiscuous mode 18:11:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x8100) 18:11:39 executing program 1: mkdir(0x0, 0x2) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000197b059c37bd7000ffdb98480a803406fc03000a0001a400"/44], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x5) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20011}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@loopback, @rand_addr="4c8a9a7d8300cc963554437a2c2339a9", @local, 0x3, 0x4, 0x5, 0x100, 0x1f, 0x2020084, r4}) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r5 = add_key(&(0x7f00000002c0)='cifs.spnego\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="4be7e1c031077be01819ff029b47a1a4f04835827a9c05f9", 0x18, 0x0) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)=0x0) keyctl$chown(0x4, r5, r6, r7) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x811, 0x0, 0x140) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r8, 0x0) 18:11:39 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1d823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:39 executing program 4: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) 18:11:39 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x40000, 0x10) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00280593bd5d74dafc20380003000000c763bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bb77bf723be80699ab51e67f4fee76b6eb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a70a452827f36c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8973841c157945f7ea2aeba088227b92e995e037bde20c8ceb6039d7a01bc3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2ed921d3740210f66f32e73b897cca2b1550053d8a4cc76efbeb16e3e4fd678792d290e73cb5ac591910dbf112f906d369c82e39adc1b159b8f5b6670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360832f5c802613a8984fdc57d958246ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d60015505000000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a18265955cf6bfae3108c5fa5c85e0bbefb5563b3d00c723b4812692f69e8faec289ae7b271e2e4b15b0f6ab9b1904b67862e13801c798521470206378e468511a84421b8ea4d797a0d22f6043c013ef87d1a8a8c5ec621591932769d4bbf6d56531c9afa8a87891761d5db8f71ccbe2c049324a4024a0bd90410ea72ced1e631b6d222914499586226969692ecf637fdaae710f44d6420d9ca76e670db7157eb39645334db2c27985f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da128cf9c71ba39b7a98f7c75929e831a0195afcc40176459cfb86f7ec8f8a69e65d38ab13ac24800af529dc2a0ff44d92bac515bb4a38b5afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a9ca929d355989f6a6eee666d55c987e40ba129fb8b9c42237e2a948a07176e81968dc902b0a8aa12a"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan0\x00'}}) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0xfffffffffffffe4d) lookup_dcookie(0x9, &(0x7f00000002c0)=""/71, 0x47) [ 1829.460921][T27018] device bridge_slave_0 left promiscuous mode [ 1829.476203][T27018] bridge1102: port 1(bridge_slave_0) entered disabled state [ 1829.535444][T27018] bridge1103: port 1(bridge_slave_0) entered blocking state [ 1829.547245][T27018] bridge1103: port 1(bridge_slave_0) entered disabled state [ 1829.556213][T27018] device bridge_slave_0 entered promiscuous mode [ 1829.576200][T27018] bridge1103: port 1(bridge_slave_0) entered blocking state 18:11:40 executing program 4: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1829.583566][T27018] bridge1103: port 1(bridge_slave_0) entered forwarding state [ 1829.613133][T27019] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1829.647188][T27024] batman_adv: Cannot find parent device 18:11:40 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) 18:11:40 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./bus\x00', 0x6, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f00000002c0)=0x4) 18:11:40 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1829.934622][T27026] device bridge1340 entered promiscuous mode [ 1829.964350][T27039] bridge1340: port 1(bridge_slave_0) entered blocking state [ 1829.977258][T27039] bridge1340: port 1(bridge_slave_0) entered disabled state [ 1829.989276][T27039] device bridge_slave_0 entered promiscuous mode [ 1829.997633][T27039] bridge1340: port 1(bridge_slave_0) entered blocking state [ 1830.005221][T27039] bridge1340: port 1(bridge_slave_0) entered forwarding state [ 1830.031905][T27135] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1830.040595][T27135] device bridge1340 left promiscuous mode [ 1830.065313][T27019] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1830.138238][T27039] device bridge1340 entered promiscuous mode [ 1830.156227][T27026] device bridge_slave_0 left promiscuous mode 18:11:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x40000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:40 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) 18:11:40 executing program 3: mkdir(&(0x7f0000000040)='./bus\x00', 0x8) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) pivot_root(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./bus/file0\x00', 0xc17, 0x3, &(0x7f00000014c0)=[{&(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffff7}, {&(0x7f00000013c0)="09b4c4d22fffd58811cf80647661716994981760634599378df5acded2bf8708ac41c7f5a866853bb5ef2372b11b08e1f9e9920d957940ad2d86a89ecc72a692f81e08e5015993d380c1d7072c59c9108277409adaa77b68494c5001266d05f913a6543343e01dfca6527733f5a6e128a223d8feb286fbd8feb03b3645cddbd869af21fe026686948764a0681591be65e057bb0a859213526b1bf11b2a85605b593d9a0f0488f467b11348b93e28c159fb2a7822190bcd3d021a5bcc74a12767bc2b5cb35daa70c9b6534c2a", 0xcc, 0x7}, {&(0x7f0000000200)="33ab2cbc933c42f8a8f18b04ad310da93defd412e0a22b6e869f0b11df106fe8c9d1aac05f928a88bc41777949c4a53df33a990e6890788f2fdcf96ea9f7a24db91141f4a5c33c09e851bcda1c0c85c759a5527e579a5821a2be", 0x5a, 0x2}], 0xa, &(0x7f0000001540)={[{@data_ordered='data=ordered'}, {@journal_async_commit='journal_async_commit'}], [{@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, '*eth0!'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, 'overlay\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x64, 0x66, 0x19, 0x31, 0x64, 0x37, 0x38], 0x2d, [0x37, 0x3375d487265771fa, 0x63, 0x34], 0x2d, [0x0, 0x62, 0x38, 0x30], 0x2d, [0xc2fb46b8dfd6a84, 0x65, 0x79b81ce12375abf2, 0x65], 0x2d, [0x30, 0x65, 0x73, 0x36, 0x36, 0x39, 0x32, 0x32]}}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0x7ff}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f8a939992675ca7f245617575916275732c776f726b6469723d2e2f66696c65312c75707040f999ac49ba36f7833fc414b657436d9db6d2186f55131373330121cddb5faa4199ee9bc15c7e57036c013a73f139efba4aec5f580f2a1251d556b5826c9121e367e09b622545209302d663d8df6d69ae7932811ef3a3af52f9452ae333ca2fc9ce78b809cef773018ce04ae771748265217bf8c6c2b4ccea58e157d41ce36c8bfad0da44b84f00c8ddcecbe310f04f2f00c3d5d50991dd62e5a8d06918054ec17cb9308f82578b4733301286cda5676a109b43c255069ca25c66374f2d480c19a34ee0bd289d9c"]) [ 1830.184922][T27026] bridge1340: port 1(bridge_slave_0) entered disabled state [ 1830.377858][T27356] device bridge1104 entered promiscuous mode [ 1830.462192][T27364] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 1830.507923][T27359] device bridge_slave_0 left promiscuous mode [ 1830.516513][T27359] bridge1103: port 1(bridge_slave_0) entered disabled state 18:11:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x1000000) 18:11:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0xb8}}, 0x0) 18:11:41 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a3a823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:41 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1830.543447][T27364] overlayfs: unrecognized mount option "upp@ù™¬Iº6÷ƒ?ĶWCm¶ÒoUs3!ÍÛ_ªA™î›Á\~Wl:sñ9ïºJì_X*QÕVµ‚l‘!ãgà›b%E “ÖcØßmi®y2ó£¯RùE*ã3Ê/ÉÎx¸ Î÷sŒàJçqt‚e!{øÆ´ÌêXáWÔãl‹úÐÚD¸O" or missing value [ 1830.589007][T27359] bridge1104: port 1(bridge_slave_0) entered blocking state [ 1830.623727][T27359] bridge1104: port 1(bridge_slave_0) entered disabled state [ 1830.667168][T27359] device bridge_slave_0 entered promiscuous mode 18:11:41 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0xafa, 0x8) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x42201, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f00000002c0)={{0x4, 0x0, 0x1, 0x6, '\x00', 0x1a}, 0x0, [0x7, 0x6, 0x7fffffff, 0x401, 0xa, 0x0, 0x7, 0x4, 0x1, 0x3, 0x2, 0x8000, 0x400, 0x4, 0xb6e5, 0x1359, 0x2, 0xd6, 0x6, 0x2, 0x2, 0xdd, 0x1, 0x5, 0x0, 0x101, 0x2, 0x7fffffff, 0x0, 0xae4, 0x2, 0x7, 0x8, 0x0, 0x1, 0x457b, 0x8, 0x4, 0x2, 0x80000000, 0x6, 0x5, 0x3ff, 0x3, 0x1, 0x277, 0x6a, 0xffffffffffffffeb, 0x5ab, 0xffffffffffffffd0, 0x1, 0x4b4a0000000, 0x7, 0x6, 0x3, 0x7f, 0x3f, 0x8, 0x2, 0x8, 0x1, 0x6, 0x0, 0x15, 0x4, 0x400, 0x7, 0xfffffffffffff000, 0xff, 0x3, 0x4, 0x1ff, 0x2, 0x7f, 0xf4, 0x48, 0x7, 0x2, 0xbe0, 0xfffffffffffffd22, 0x8, 0x3, 0x8, 0x3, 0xecf, 0x8, 0xfffffffffffffffc, 0x3ff, 0x7, 0x7357, 0x1, 0x9, 0xffffffff, 0x1, 0x0, 0xffffffff, 0x1000, 0x2, 0x100000000, 0xffffffffffffffe0, 0x673, 0x6, 0x3, 0xfffffffffffffffa, 0xffff, 0x1, 0xfffffffffffffffe, 0x9, 0x7, 0x5, 0xb, 0xffffffff, 0x1, 0x6, 0xffffffff, 0x4, 0x7, 0x2, 0x337, 0x2, 0xe1, 0x7, 0x1, 0x80, 0xfffffffffffffff8, 0x1be0, 0x20, 0x6d11]}) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1830.729592][T27359] bridge1104: port 1(bridge_slave_0) entered blocking state [ 1830.737012][T27359] bridge1104: port 1(bridge_slave_0) entered forwarding state 18:11:41 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000200)=0x7fff, 0x4) 18:11:41 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1830.940620][T27478] device bridge1342 entered promiscuous mode 18:11:41 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 1831.002624][T27480] bridge1342: port 1(bridge_slave_0) entered blocking state [ 1831.020754][T27480] bridge1342: port 1(bridge_slave_0) entered disabled state [ 1831.029569][T27480] device bridge_slave_0 entered promiscuous mode [ 1831.040949][T27480] bridge1342: port 1(bridge_slave_0) entered blocking state 18:11:41 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="01"]) [ 1831.048310][T27480] bridge1342: port 1(bridge_slave_0) entered forwarding state [ 1831.164110][T27487] device bridge1342 left promiscuous mode [ 1831.267367][T27478] device bridge1342 entered promiscuous mode 18:11:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x48000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:41 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f00000002c0)=@v2={0xca54d293a41d276d, 0x0, 0x7, 0x2, 0xfc, "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"}, 0x106, 0x3) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, 0x0) [ 1831.369071][T27487] device bridge1342 left promiscuous mode 18:11:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x2000000) 18:11:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x3, 0xb8c}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1831.531144][T27812] device bridge1105 entered promiscuous mode [ 1831.629623][T27915] device bridge_slave_0 left promiscuous mode [ 1831.640682][T27915] bridge1104: port 1(bridge_slave_0) entered disabled state [ 1831.716677][T27915] bridge1105: port 1(bridge_slave_0) entered blocking state [ 1831.741458][T27915] bridge1105: port 1(bridge_slave_0) entered disabled state [ 1831.751439][T27915] device bridge_slave_0 entered promiscuous mode [ 1831.768635][T27915] bridge1105: port 1(bridge_slave_0) entered blocking state [ 1831.776130][T27915] bridge1105: port 1(bridge_slave_0) entered forwarding state 18:11:42 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e82259c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, 0x0) 18:11:42 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f6601006530ee3ff0921ae9034fe03d80daf726059fdc712c88a5d3bf467b0b494dca6a653f07658c1f"]) 18:11:42 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x43, &(0x7f0000000000), 0x20836000) [ 1831.826726][T28022] device bridge1343 entered promiscuous mode [ 1831.859280][T28026] device bridge_slave_0 left promiscuous mode [ 1831.865595][T28026] bridge1342: port 1(bridge_slave_0) entered disabled state [ 1831.903634][T28032] overlayfs: failed to resolve './f': -2 [ 1831.934032][T28026] bridge1343: port 1(bridge_slave_0) entered blocking state 18:11:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, 0x0) 18:11:42 executing program 1: [ 1831.957936][T28026] bridge1343: port 1(bridge_slave_0) entered disabled state [ 1831.998646][T28026] device bridge_slave_0 entered promiscuous mode [ 1832.079155][T28026] bridge1343: port 1(bridge_slave_0) entered blocking state [ 1832.086521][T28026] bridge1343: port 1(bridge_slave_0) entered forwarding state 18:11:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[]) [ 1832.198131][T28022] device bridge1343 left promiscuous mode 18:11:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x4c000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:42 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x4b1ad92fbc726ed1) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:42 executing program 1: [ 1832.325749][T28027] device bridge1343 entered promiscuous mode 18:11:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x3000000) 18:11:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[]) [ 1832.580001][T28357] device bridge1106 entered promiscuous mode [ 1832.686711][T28361] device bridge_slave_0 left promiscuous mode [ 1832.698875][T28361] bridge1105: port 1(bridge_slave_0) entered disabled state [ 1832.756253][T28361] bridge1106: port 1(bridge_slave_0) entered blocking state [ 1832.778108][T28361] bridge1106: port 1(bridge_slave_0) entered disabled state [ 1832.786175][T28361] device bridge_slave_0 entered promiscuous mode [ 1832.793945][T28361] bridge1106: port 1(bridge_slave_0) entered blocking state [ 1832.801405][T28361] bridge1106: port 1(bridge_slave_0) entered forwarding state [ 1832.820352][T28365] validate_nla: 9 callbacks suppressed [ 1832.820364][T28365] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1832.862360][T28367] device bridge1345 entered promiscuous mode [ 1832.883929][T28368] device bridge_slave_0 left promiscuous mode [ 1832.893233][T28368] bridge1343: port 1(bridge_slave_0) entered disabled state [ 1832.944150][T28368] bridge1345: port 1(bridge_slave_0) entered blocking state [ 1832.951625][T28368] bridge1345: port 1(bridge_slave_0) entered disabled state [ 1832.959716][T28368] device bridge_slave_0 entered promiscuous mode [ 1832.967034][T28368] bridge1345: port 1(bridge_slave_0) entered blocking state [ 1832.974497][T28368] bridge1345: port 1(bridge_slave_0) entered forwarding state 18:11:43 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823c9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:43 executing program 1: 18:11:43 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus/file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x82, 0x4, 0x9, "b5c8a99f8741c217333d2a7bd4699925", "cceaaad922751a84e968ea34f0477d6532a28e8d5f0edab54772221fa5021aca50c5743800addfce4dcf9b8bcb876fdff00891d403ae68a6df5580d3ae86b6bc7af0219ce971b0e21bd8deb7ce2c9bbba8d1e95a6497d704777a77c3ee7964fbf572f3a5a0427cb8dcb0b21cc0"}, 0x82, 0x3) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file2\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[]) [ 1832.995481][T28371] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1833.004152][T28371] device bridge1345 left promiscuous mode [ 1833.045389][T28365] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:43 executing program 1: 18:11:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB]) [ 1833.119671][T28367] device bridge1345 entered promiscuous mode 18:11:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x60000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1833.212835][T28371] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:43 executing program 1: [ 1833.303750][T28371] device bridge1345 left promiscuous mode 18:11:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB]) 18:11:43 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000500)='./bus\x00', 0x40) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000180)={0x0, @reserved}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000001c0)={0x401, 0x1, 0x4, 0x4, 0x4e, {0x77359400}, {0x1, 0x0, 0x3f, 0x9, 0x0, 0x24, "1266c9cd"}, 0x0, 0x4, @offset=0x6, 0x20, 0x0, 0xffffffffffffffff}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r5, r6) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x400, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=01512737032572126415534,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,blksize=0x0000000000001000,allow_other,blksize=0x0000000000001800,blksize=0x0000000000000400,allow_other,default_permissions,uid>', @ANYRESDEC=r7, @ANYBLOB=',appraise,obj_role=,pcr=00000000000000000056,euid<', @ANYRESDEC=r9, @ANYBLOB="2c636f6e746578743d726f6f742c646f6e745f686173682c6d61736b3d5e4d41595f524541442c666f776e657212", @ANYRESDEC=r11, @ANYBLOB="2c6673757569643d39003166613700632d616535622d376200612dd732a3352d64333066353366352c00"]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1833.497317][T28491] device bridge1108 entered promiscuous mode 18:11:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x4000000) 18:11:44 executing program 1: [ 1833.552428][T28494] device bridge_slave_0 left promiscuous mode [ 1833.593061][T28494] bridge1106: port 1(bridge_slave_0) entered disabled state [ 1833.665605][T28494] bridge1108: port 1(bridge_slave_0) entered blocking state [ 1833.763881][T28494] bridge1108: port 1(bridge_slave_0) entered disabled state [ 1833.772739][T28494] device bridge_slave_0 entered promiscuous mode [ 1833.785984][T28494] bridge1108: port 1(bridge_slave_0) entered blocking state [ 1833.793349][T28494] bridge1108: port 1(bridge_slave_0) entered forwarding state [ 1833.823808][T28495] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1833.914470][T28529] device bridge1346 entered promiscuous mode [ 1833.932635][T28607] device bridge_slave_0 left promiscuous mode [ 1833.941272][T28607] bridge1345: port 1(bridge_slave_0) entered disabled state [ 1833.986346][T28607] bridge1346: port 1(bridge_slave_0) entered blocking state [ 1833.994341][T28607] bridge1346: port 1(bridge_slave_0) entered disabled state [ 1834.002693][T28607] device bridge_slave_0 entered promiscuous mode [ 1834.011605][T28607] bridge1346: port 1(bridge_slave_0) entered blocking state [ 1834.018959][T28607] bridge1346: port 1(bridge_slave_0) entered forwarding state [ 1834.040510][T28612] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1834.058543][T28612] device bridge1346 left promiscuous mode [ 1834.087065][T28495] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1834.116250][T28607] device bridge1346 entered promiscuous mode 18:11:44 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823e9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB]) 18:11:44 executing program 1: 18:11:44 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x52) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x64cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1834.135474][T28529] device bridge_slave_0 left promiscuous mode [ 1834.144821][T28529] bridge1346: port 1(bridge_slave_0) entered disabled state 18:11:44 executing program 1: [ 1834.247856][T28610] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:44 executing program 4: 18:11:44 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./b./file*,upperdir=./file0\x00'/47]) getpid() 18:11:44 executing program 1: 18:11:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x5000000) [ 1834.475733][T28626] device bridge1109 entered promiscuous mode 18:11:45 executing program 4: [ 1834.573945][T28634] device bridge_slave_0 left promiscuous mode [ 1834.590539][T28634] bridge1108: port 1(bridge_slave_0) entered disabled state 18:11:45 executing program 1: [ 1834.644693][T28745] overlayfs: missing 'workdir' [ 1834.723487][T28634] bridge1109: port 1(bridge_slave_0) entered blocking state [ 1834.741745][T28634] bridge1109: port 1(bridge_slave_0) entered disabled state [ 1834.751373][T28634] device bridge_slave_0 entered promiscuous mode [ 1834.770255][T28634] bridge1109: port 1(bridge_slave_0) entered blocking state [ 1834.777613][T28634] bridge1109: port 1(bridge_slave_0) entered forwarding state [ 1834.825591][T28737] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1834.981517][T28746] device bridge1348 entered promiscuous mode [ 1835.002730][T28779] bridge1348: port 1(bridge_slave_0) entered blocking state [ 1835.010371][T28779] bridge1348: port 1(bridge_slave_0) entered disabled state [ 1835.020843][T28779] device bridge_slave_0 entered promiscuous mode [ 1835.032598][T28779] bridge1348: port 1(bridge_slave_0) entered blocking state [ 1835.039933][T28779] bridge1348: port 1(bridge_slave_0) entered forwarding state [ 1835.061708][T28856] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1835.073379][T28856] device bridge1348 left promiscuous mode [ 1835.103252][T28746] device bridge1348 entered promiscuous mode [ 1835.132414][T28841] device bridge1348 left promiscuous mode 18:11:45 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c02a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:45 executing program 4: 18:11:45 executing program 1: 18:11:45 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f776b99ad2c723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530"]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x20100, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f00000001c0)='./file2\x00', r0}, 0x10) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) 18:11:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x65580000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6000000) 18:11:45 executing program 4: 18:11:45 executing program 1: [ 1835.368864][T28871] overlayfs: unrecognized mount option "lowk™­" or missing value [ 1835.397292][T28872] device bridge1110 entered promiscuous mode 18:11:45 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x8080}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6c6f77657264f08700002f2ca66275732c772f66696c65312c75707065726469723d152f66696c6530"]) [ 1835.553212][T28874] device bridge1349 entered promiscuous mode 18:11:46 executing program 4: 18:11:46 executing program 1: [ 1835.634875][T28876] device bridge_slave_0 left promiscuous mode [ 1835.670367][T28876] bridge1109: port 1(bridge_slave_0) entered disabled state [ 1835.726553][T28876] bridge1110: port 1(bridge_slave_0) entered blocking state 18:11:46 executing program 1: [ 1835.822756][T28876] bridge1110: port 1(bridge_slave_0) entered disabled state [ 1835.870401][T28876] device bridge_slave_0 entered promiscuous mode [ 1835.902641][T28876] bridge1110: port 1(bridge_slave_0) entered blocking state [ 1835.909978][T28876] bridge1110: port 1(bridge_slave_0) entered forwarding state [ 1836.016692][T28902] device bridge_slave_0 left promiscuous mode [ 1836.030118][T28902] bridge1348: port 1(bridge_slave_0) entered disabled state [ 1836.075807][T28902] bridge1349: port 1(bridge_slave_0) entered blocking state [ 1836.094967][T28902] bridge1349: port 1(bridge_slave_0) entered disabled state [ 1836.104155][T28902] device bridge_slave_0 entered promiscuous mode [ 1836.112805][T28902] bridge1349: port 1(bridge_slave_0) entered blocking state [ 1836.120253][T28902] bridge1349: port 1(bridge_slave_0) entered forwarding state [ 1836.145652][T28984] device bridge1349 left promiscuous mode [ 1836.248426][T28874] device bridge1349 entered promiscuous mode [ 1836.273768][T28984] device bridge1349 left promiscuous mode 18:11:46 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c03a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:46 executing program 4: 18:11:46 executing program 1: 18:11:46 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='overlay\x00', 0x8000a, &(0x7f0000000100)=ANY=[@ANYRESOCT]) 18:11:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x65cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7000000) 18:11:46 executing program 1: 18:11:46 executing program 4: [ 1836.548268][T29114] device bridge1111 entered promiscuous mode 18:11:47 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x72}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffffff, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4002014}, 0xc012) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:47 executing program 1: 18:11:47 executing program 4: [ 1836.625054][T29217] device bridge_slave_0 left promiscuous mode [ 1836.655637][T29217] bridge1110: port 1(bridge_slave_0) entered disabled state [ 1836.747089][T29217] bridge1111: port 1(bridge_slave_0) entered blocking state 18:11:47 executing program 1: [ 1836.787968][T29217] bridge1111: port 1(bridge_slave_0) entered disabled state [ 1836.851062][T29217] device bridge_slave_0 entered promiscuous mode [ 1836.869094][T29217] bridge1111: port 1(bridge_slave_0) entered blocking state [ 1836.876506][T29217] bridge1111: port 1(bridge_slave_0) entered forwarding state [ 1837.021962][T29219] device bridge1350 entered promiscuous mode [ 1837.047669][T29226] device bridge_slave_0 left promiscuous mode [ 1837.054509][T29226] bridge1349: port 1(bridge_slave_0) entered disabled state [ 1837.116404][T29226] bridge1350: port 1(bridge_slave_0) entered blocking state [ 1837.147493][T29226] bridge1350: port 1(bridge_slave_0) entered disabled state [ 1837.180276][T29226] device bridge_slave_0 entered promiscuous mode [ 1837.190461][T29226] bridge1350: port 1(bridge_slave_0) entered blocking state [ 1837.197928][T29226] bridge1350: port 1(bridge_slave_0) entered forwarding state [ 1837.233713][T29228] device bridge1350 left promiscuous mode [ 1837.294009][T29219] device bridge1350 entered promiscuous mode [ 1837.316857][T29228] device bridge1350 left promiscuous mode 18:11:47 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c04a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:47 executing program 4: 18:11:47 executing program 1: 18:11:47 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x10) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x66cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xa000000) 18:11:48 executing program 4: 18:11:48 executing program 1: [ 1837.591433][T29352] device bridge1112 entered promiscuous mode 18:11:48 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c65303570a7ba94b8462eeef5e35f71e44bab42e4126ef75c24e4d32c1087d58caf7c381e3630a1c47c74f7f364c79001b9badf0ecffb955c9275969475bdbf2aa77738597aef4282999d4cd1bfdc39d1f92388e7da3efddf65dfdae1093854ab9aaa05000000000000005c1956d21ac8f5bb60"]) [ 1837.720806][T29353] device bridge1351 entered promiscuous mode 18:11:48 executing program 4: [ 1837.768597][T29355] device bridge_slave_0 left promiscuous mode [ 1837.775056][T29355] bridge1111: port 1(bridge_slave_0) entered disabled state 18:11:48 executing program 1: [ 1837.837340][T29355] bridge1112: port 1(bridge_slave_0) entered blocking state [ 1837.859599][T29355] bridge1112: port 1(bridge_slave_0) entered disabled state [ 1837.900460][T29355] device bridge_slave_0 entered promiscuous mode [ 1837.939432][T29355] bridge1112: port 1(bridge_slave_0) entered blocking state [ 1837.946894][T29355] bridge1112: port 1(bridge_slave_0) entered forwarding state 18:11:48 executing program 4: [ 1837.981316][T29472] overlayfs: unrecognized mount option "‡ÕŒ¯|860¡Ä|t÷ódǹºßÏû•\’u–”u½¿*§w8YzïB‚™LÑ¿Ü9Ñù#ˆçÚ>ýßeßÚá 8T«šª" or missing value [ 1838.011720][T29357] device bridge_slave_0 left promiscuous mode [ 1838.055485][T29357] bridge1350: port 1(bridge_slave_0) entered disabled state [ 1838.130442][T29357] bridge1351: port 1(bridge_slave_0) entered blocking state [ 1838.139944][T29357] bridge1351: port 1(bridge_slave_0) entered disabled state [ 1838.149331][T29357] device bridge_slave_0 entered promiscuous mode [ 1838.162953][T29357] bridge1351: port 1(bridge_slave_0) entered blocking state [ 1838.170329][T29357] bridge1351: port 1(bridge_slave_0) entered forwarding state [ 1838.252529][T29393] validate_nla: 10 callbacks suppressed [ 1838.252541][T29393] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1838.293081][T29464] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1838.326629][T29464] device bridge1351 left promiscuous mode [ 1838.383399][T29353] device bridge1351 entered promiscuous mode [ 1838.395519][T29393] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1838.415848][T29464] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1838.438958][T29464] device bridge1351 left promiscuous mode 18:11:49 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c05a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:49 executing program 4: 18:11:49 executing program 1: 18:11:49 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x3) mount$overlay(0x400000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:11:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x67cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xc000000) [ 1838.636579][T29591] device bridge1352 entered promiscuous mode 18:11:49 executing program 4: 18:11:49 executing program 1: [ 1838.713252][T29589] device bridge1113 entered promiscuous mode [ 1838.762534][T29593] device bridge_slave_0 left promiscuous mode [ 1838.790003][T29593] bridge1112: port 1(bridge_slave_0) entered disabled state 18:11:49 executing program 4: 18:11:49 executing program 3: 18:11:49 executing program 1: [ 1838.876616][T29593] bridge1113: port 1(bridge_slave_0) entered blocking state [ 1838.904886][T29593] bridge1113: port 1(bridge_slave_0) entered disabled state 18:11:49 executing program 4: [ 1838.961928][T29593] device bridge_slave_0 entered promiscuous mode [ 1839.006399][T29593] bridge1113: port 1(bridge_slave_0) entered blocking state [ 1839.013769][T29593] bridge1113: port 1(bridge_slave_0) entered forwarding state [ 1839.113980][T29594] device bridge_slave_0 left promiscuous mode [ 1839.128765][T29594] bridge1351: port 1(bridge_slave_0) entered disabled state [ 1839.196333][T29594] bridge1352: port 1(bridge_slave_0) entered blocking state [ 1839.217419][T29594] bridge1352: port 1(bridge_slave_0) entered disabled state [ 1839.236443][T29594] device bridge_slave_0 entered promiscuous mode [ 1839.253040][T29594] bridge1352: port 1(bridge_slave_0) entered blocking state [ 1839.260373][T29594] bridge1352: port 1(bridge_slave_0) entered forwarding state [ 1839.295891][T29598] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1839.325170][T29627] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1839.347026][T29627] device bridge1352 left promiscuous mode [ 1839.412434][T29598] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1839.438162][T29627] device bridge1352 entered promiscuous mode [ 1839.469189][T29594] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1839.478213][T29594] device bridge1352 left promiscuous mode 18:11:50 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c06a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:50 executing program 1: 18:11:50 executing program 3: 18:11:50 executing program 4: 18:11:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x68000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xe000000) 18:11:50 executing program 3: 18:11:50 executing program 1: 18:11:50 executing program 4: [ 1839.767362][T29726] device bridge1114 entered promiscuous mode [ 1839.840376][T29729] device bridge1353 entered promiscuous mode 18:11:50 executing program 3: [ 1839.942073][T29730] device bridge_slave_0 left promiscuous mode [ 1839.953007][T29730] bridge1113: port 1(bridge_slave_0) entered disabled state 18:11:50 executing program 1: 18:11:50 executing program 4: [ 1840.046060][T29730] bridge1114: port 1(bridge_slave_0) entered blocking state [ 1840.063213][T29730] bridge1114: port 1(bridge_slave_0) entered disabled state [ 1840.072648][T29730] device bridge_slave_0 entered promiscuous mode [ 1840.083910][T29730] bridge1114: port 1(bridge_slave_0) entered blocking state [ 1840.091250][T29730] bridge1114: port 1(bridge_slave_0) entered forwarding state [ 1840.113839][T29732] device bridge_slave_0 left promiscuous mode [ 1840.123529][T29732] bridge1352: port 1(bridge_slave_0) entered disabled state [ 1840.212451][T29732] bridge1353: port 1(bridge_slave_0) entered blocking state [ 1840.248199][T29732] bridge1353: port 1(bridge_slave_0) entered disabled state [ 1840.265372][T29732] device bridge_slave_0 entered promiscuous mode [ 1840.291358][T29732] bridge1353: port 1(bridge_slave_0) entered blocking state [ 1840.298909][T29732] bridge1353: port 1(bridge_slave_0) entered forwarding state [ 1840.354815][T29733] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1840.403872][T29742] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1840.417458][T29742] device bridge1353 left promiscuous mode [ 1840.459739][T29742] device bridge1353 entered promiscuous mode [ 1840.479076][T29732] device bridge1353 left promiscuous mode 18:11:51 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c07a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:51 executing program 4: 18:11:51 executing program 3: 18:11:51 executing program 1: 18:11:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x68cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xf000000) 18:11:51 executing program 1: [ 1840.710302][T29762] device bridge1115 entered promiscuous mode 18:11:51 executing program 4: unshare(0x40600) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x142b54026781a051, 0x0) 18:11:51 executing program 3: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) vmsplice(r0, &(0x7f0000004500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 1840.795590][T29763] device bridge1354 entered promiscuous mode 18:11:51 executing program 1: [ 1840.912369][T29765] device bridge_slave_0 left promiscuous mode [ 1840.929532][T29765] bridge1114: port 1(bridge_slave_0) entered disabled state [ 1841.004166][T29765] bridge1115: port 1(bridge_slave_0) entered blocking state [ 1841.028884][T29765] bridge1115: port 1(bridge_slave_0) entered disabled state 18:11:51 executing program 3: [ 1841.049928][T29765] device bridge_slave_0 entered promiscuous mode [ 1841.069301][T29765] bridge1115: port 1(bridge_slave_0) entered blocking state [ 1841.076821][T29765] bridge1115: port 1(bridge_slave_0) entered forwarding state 18:11:51 executing program 1: [ 1841.102209][T29766] device bridge_slave_0 left promiscuous mode [ 1841.124345][T29766] bridge1353: port 1(bridge_slave_0) entered disabled state [ 1841.197230][T29766] bridge1354: port 1(bridge_slave_0) entered blocking state [ 1841.220194][T29766] bridge1354: port 1(bridge_slave_0) entered disabled state [ 1841.268722][T29766] device bridge_slave_0 entered promiscuous mode [ 1841.292285][T29766] bridge1354: port 1(bridge_slave_0) entered blocking state [ 1841.299849][T29766] bridge1354: port 1(bridge_slave_0) entered forwarding state [ 1841.389757][T29772] device bridge1354 left promiscuous mode [ 1841.513131][T29763] device bridge1354 entered promiscuous mode 18:11:52 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c08a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:52 executing program 1: 18:11:52 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) 18:11:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x69cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:52 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5415, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1841.567838][T29772] device bridge1354 left promiscuous mode 18:11:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x10000000) 18:11:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x14, 0x12, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 18:11:52 executing program 4: unshare(0x40600) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x9, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) 18:11:52 executing program 3: unshare(0x40600) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 1841.867305][T29905] device bridge1116 entered promiscuous mode [ 1841.906608][T29908] device bridge_slave_0 left promiscuous mode [ 1841.924600][T29908] bridge1115: port 1(bridge_slave_0) entered disabled state 18:11:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x300, 0x8, 0x0, r1, 0x0}]) 18:11:52 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', 0x0, 0x1003004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x9aad30, 0x0) [ 1842.006118][T29908] bridge1116: port 1(bridge_slave_0) entered blocking state [ 1842.034341][T29908] bridge1116: port 1(bridge_slave_0) entered disabled state [ 1842.054309][T29908] device bridge_slave_0 entered promiscuous mode [ 1842.087460][T29908] bridge1116: port 1(bridge_slave_0) entered blocking state [ 1842.094804][T29908] bridge1116: port 1(bridge_slave_0) entered forwarding state [ 1842.175550][T29911] device bridge1355 entered promiscuous mode 18:11:52 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5411, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1842.301092][T29916] device bridge_slave_0 left promiscuous mode [ 1842.307488][T29916] bridge1354: port 1(bridge_slave_0) entered disabled state [ 1842.317049][T29933] EXT4-fs (sda1): re-mounted. Opts: [ 1842.365010][T29916] bridge1355: port 1(bridge_slave_0) entered blocking state [ 1842.381447][T29916] bridge1355: port 1(bridge_slave_0) entered disabled state [ 1842.394112][T29916] device bridge_slave_0 entered promiscuous mode [ 1842.412012][T29916] bridge1355: port 1(bridge_slave_0) entered blocking state [ 1842.419532][T29916] bridge1355: port 1(bridge_slave_0) entered forwarding state [ 1842.519500][T29924] device bridge1355 left promiscuous mode [ 1842.592619][T29921] device bridge1355 entered promiscuous mode [ 1842.628831][T29911] device bridge_slave_0 left promiscuous mode [ 1842.635136][T29911] bridge1355: port 1(bridge_slave_0) entered disabled state 18:11:53 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c09a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:53 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5411, 0x0) 18:11:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x84e, 0x22040) close(r0) 18:11:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6acc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000f07fae"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)="a6f33aff4858cd7574a73bfe4c4e", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1842.927384][T30055] device bridge1117 entered promiscuous mode 18:11:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x20000000) 18:11:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008002, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:11:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000b5700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) [ 1842.990090][T30058] device bridge_slave_0 left promiscuous mode [ 1843.019757][T30058] bridge1116: port 1(bridge_slave_0) entered disabled state 18:11:53 executing program 1: unshare(0x40600) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) [ 1843.044726][T30166] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:11:53 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x80285442, 0x0) [ 1843.107450][T30058] bridge1117: port 1(bridge_slave_0) entered blocking state [ 1843.141983][T30058] bridge1117: port 1(bridge_slave_0) entered disabled state 18:11:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x268, 0x0, 0x268, 0x268, 0x268, 0x460, 0x460, 0x460, 0x460, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_virt_wifi\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) [ 1843.171077][T30058] device bridge_slave_0 entered promiscuous mode [ 1843.205035][T30058] bridge1117: port 1(bridge_slave_0) entered blocking state [ 1843.212498][T30058] bridge1117: port 1(bridge_slave_0) entered forwarding state 18:11:53 executing program 1: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0xff) readlinkat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/122, 0x7a) [ 1843.288261][T30146] validate_nla: 10 callbacks suppressed [ 1843.288279][T30146] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1843.368239][T30218] device bridge1357 entered promiscuous mode [ 1843.430713][T30280] bridge1357: port 1(bridge_slave_0) entered blocking state [ 1843.438375][T30280] bridge1357: port 1(bridge_slave_0) entered disabled state [ 1843.456170][T30280] device bridge_slave_0 entered promiscuous mode [ 1843.470310][T30280] bridge1357: port 1(bridge_slave_0) entered blocking state [ 1843.477668][T30280] bridge1357: port 1(bridge_slave_0) entered forwarding state [ 1843.553031][T30285] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1843.565220][T30285] device bridge1357 left promiscuous mode [ 1843.594124][T30146] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1843.647148][T30218] device bridge_slave_0 left promiscuous mode [ 1843.660930][T30218] bridge1357: port 1(bridge_slave_0) entered disabled state 18:11:54 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0aa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000c01a000000b700000000000000950000020000d000f07fae"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x13}, 0x48) 18:11:54 executing program 1: setrlimit(0x7, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) 18:11:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x268, 0x0, 0x268, 0x268, 0x268, 0x460, 0x460, 0x460, 0x460, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_virt_wifi\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 18:11:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6bcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1843.915108][T30280] device bridge1357 entered promiscuous mode [ 1843.955143][T30285] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1844.072103][T30545] device bridge1119 entered promiscuous mode [ 1844.109593][T30630] device bridge_slave_0 left promiscuous mode 18:11:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x40000000) 18:11:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b70a0000010000004870000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) 18:11:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x2, &(0x7f0000000040)) 18:11:54 executing program 3: unshare(0x40600) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) fdatasync(r0) [ 1844.117508][T30630] bridge1117: port 1(bridge_slave_0) entered disabled state [ 1844.205898][T30630] bridge1119: port 1(bridge_slave_0) entered blocking state [ 1844.218736][T30630] bridge1119: port 1(bridge_slave_0) entered disabled state 18:11:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)) [ 1844.272233][T30630] device bridge_slave_0 entered promiscuous mode [ 1844.305550][T30630] bridge1119: port 1(bridge_slave_0) entered blocking state [ 1844.313087][T30630] bridge1119: port 1(bridge_slave_0) entered forwarding state 18:11:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x6, 0x5, 0x0, 0x0, 0xf000}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) [ 1844.343840][T30633] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:54 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) [ 1844.525028][T30808] device bridge1359 entered promiscuous mode [ 1844.599801][T30847] bridge1359: port 1(bridge_slave_0) entered blocking state [ 1844.640891][T30847] bridge1359: port 1(bridge_slave_0) entered disabled state [ 1844.665656][T30847] device bridge_slave_0 entered promiscuous mode [ 1844.683610][T30847] bridge1359: port 1(bridge_slave_0) entered blocking state [ 1844.691084][T30847] bridge1359: port 1(bridge_slave_0) entered forwarding state [ 1844.728531][T30852] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1844.736957][T30852] device bridge1359 left promiscuous mode [ 1844.749924][T30633] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:55 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0ba49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)) 18:11:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) 18:11:55 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 18:11:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6c000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1844.856747][T30847] device bridge1359 entered promiscuous mode [ 1844.922611][T30808] device bridge_slave_0 left promiscuous mode [ 1844.955578][T30808] bridge1359: port 1(bridge_slave_0) entered disabled state [ 1845.028700][T31077] device bridge_slave_0 left promiscuous mode [ 1845.035363][T31077] bridge1119: port 1(bridge_slave_0) entered disabled state [ 1845.113098][T30852] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:11:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x48000000) 18:11:55 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @loopback}, 0x121}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/64, 0x40}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 18:11:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {}, {0x2, 0x0, @remote}, {}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='sit0\x00'}) 18:11:55 executing program 3: mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000003800)=""/4100, 0xffffff5f}], 0x3, 0x0, 0x17b, 0x3e8}, 0x180) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYRESHEX, @ANYRES32, @ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="dc9d3f74a43a0d71057c1b77e359e891ebc9be6d698388e17f3056e89224707a", @ANYBLOB="bfc98e8192cb0a9e79f202467c4be532cb8509741d6b35b9407b516de574e75eb6e7707a648644a4648487a557ec9d89ce3c0304e0d899911dc395259c95cc049b413fcc8bb534aee4d921485ca5cf773b0cab00346675446489d0", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRES64, @ANYRES64, @ANYRESHEX=0x0, @ANYPTR], @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRESHEX=0x0, @ANYRESOCT, @ANYRES64, @ANYRESHEX], @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES32, @ANYRES32], @ANYRES64, @ANYRES32, @ANYBLOB="da9191a0e7d50931ff67a36a2b0a4538d83761b40fa899b14158a6e13223b4368cbf26872f561879e9a9990061ff3b43bb44e96ad25eff117365ee216f5ee11947b1081d9570cb7a99c8c0280b81a5b3c9d726cf933d9365fae704b66d82fd415d51e52ceb15eeb7ba2a15e37d0b1a7c5b2178ae665a548750f99fbc27893a21fd3a2ca9062b9b1ed13f6da70fc2e08601ee35a7fde01f98bf78bccba4cc86834bc510de0c8189a068046b73f847db8f7da84bc4dae1e2be3647310e0f1a8d", @ANYBLOB="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"], 0x100000475) [ 1845.228263][T30980] device bridge1120 entered promiscuous mode 18:11:55 executing program 4: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, r0/1000+30000}) [ 1845.274020][T31080] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1845.381060][T31089] device bridge1361 entered promiscuous mode [ 1845.452005][T31094] bridge1361: port 1(bridge_slave_0) entered blocking state [ 1845.472210][T31094] bridge1361: port 1(bridge_slave_0) entered disabled state 18:11:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870020000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) 18:11:56 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1845.508333][T31094] device bridge_slave_0 entered promiscuous mode [ 1845.521922][T31094] bridge1361: port 1(bridge_slave_0) entered blocking state [ 1845.529373][T31094] bridge1361: port 1(bridge_slave_0) entered forwarding state [ 1845.549628][T31077] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1845.585149][T31301] device bridge1361 left promiscuous mode [ 1845.609680][T31094] device bridge1361 entered promiscuous mode [ 1845.650725][T31089] device bridge_slave_0 left promiscuous mode [ 1845.681355][T31089] bridge1361: port 1(bridge_slave_0) entered disabled state 18:11:56 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0ca49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6ccc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:56 executing program 1: unshare(0x40600) fstat(0xffffffffffffffff, 0x0) 18:11:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x8, 0x0) 18:11:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x4c000000) [ 1845.998673][T31314] device bridge1121 entered promiscuous mode 18:11:56 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) [ 1846.045966][T31319] bridge1121: port 1(bridge_slave_0) entered blocking state [ 1846.071396][T31319] bridge1121: port 1(bridge_slave_0) entered disabled state [ 1846.087342][T31319] device bridge_slave_0 entered promiscuous mode 18:11:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3, 0x0, 0x10}, 0x3c) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) [ 1846.100650][T31319] bridge1121: port 1(bridge_slave_0) entered blocking state [ 1846.108005][T31319] bridge1121: port 1(bridge_slave_0) entered forwarding state 18:11:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0xa, 0x0, r1, 0x0}]) 18:11:56 executing program 4: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) [ 1846.295805][T31425] device bridge1363 entered promiscuous mode [ 1846.334919][T31428] bridge1363: port 1(bridge_slave_0) entered blocking state [ 1846.360204][T31428] bridge1363: port 1(bridge_slave_0) entered disabled state [ 1846.398988][T31428] device bridge_slave_0 entered promiscuous mode [ 1846.407628][T31428] bridge1363: port 1(bridge_slave_0) entered blocking state [ 1846.415012][T31428] bridge1363: port 1(bridge_slave_0) entered forwarding state [ 1846.437793][T31431] device bridge1363 left promiscuous mode [ 1846.558778][T31428] device bridge1363 entered promiscuous mode 18:11:57 executing program 3: unshare(0x20020400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 18:11:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000003800)=""/4100, 0xffffff5f}], 0x3, 0x0, 0x17b, 0x3e8}, 0x180) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYRESHEX, @ANYRES32, @ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="dc9d3f74a43a0d71057c1b77e359e891ebc9be6d698388e17f3056e89224707a", @ANYBLOB="bfc98e8192cb0a9e79f202467c4be532cb8509741d6b35b9407b516de574e75eb6e7707a648644a4648487a557ec9d89ce3c0304e0d899911dc395259c95cc049b413fcc8bb534aee4d921485ca5cf773b0cab00346675446489d0", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRES64, @ANYRES64, @ANYRESHEX=0x0, @ANYPTR], @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRESHEX=0x0, @ANYRESOCT, @ANYRES64, @ANYRESHEX], @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES32, @ANYRES32], @ANYRES64, @ANYRES32, @ANYBLOB="da9191a0e7d50931ff67a36a2b0a4538d83761b40fa899b14158a6e13223b4368cbf26872f561879e9a9990061ff3b43bb44e96ad25eff117365ee216f5ee11947b1081d9570cb7a99c8c0280b81a5b3c9d726cf933d9365fae704b66d82fd415d51e52ceb15eeb7ba2a15e37d0b1a7c5b2178ae665a548750f99fbc27893a21fd3a2ca9062b9b1ed13f6da70fc2e08601ee35a7fde01f98bf78bccba4cc86834bc510de0c8189a068046b73f847db8f7da84bc4dae1e2be3647310e0f1a8d", @ANYBLOB="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"], 0x100000475) 18:11:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6dcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:57 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0da49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:57 executing program 4: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) inotify_add_watch(r0, 0x0, 0x80000081) 18:11:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x60000000) [ 1846.878035][T31653] device bridge1122 entered promiscuous mode 18:11:57 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0xfdfdffff, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) 18:11:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x22040) close(r0) [ 1846.971973][T31657] device bridge_slave_0 left promiscuous mode [ 1846.997270][T31657] bridge1121: port 1(bridge_slave_0) entered disabled state 18:11:57 executing program 4: unshare(0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ftruncate(0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) [ 1847.065914][T31657] bridge1122: port 1(bridge_slave_0) entered blocking state [ 1847.076153][T31657] bridge1122: port 1(bridge_slave_0) entered disabled state 18:11:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8ad17", @ANYRES16=0x0, @ANYBLOB="00000000742a000000000b00000000040002002c00020008000200000000000800010000000000080001000000000008000100000004000000000000000400020004000200500007000c00040080000000000000000c000400000000000000000008000100000040000c0004000000000c00030000000000000004000c"], 0x3}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) [ 1847.132056][T31657] device bridge_slave_0 entered promiscuous mode [ 1847.144391][T31657] bridge1122: port 1(bridge_slave_0) entered blocking state [ 1847.151817][T31657] bridge1122: port 1(bridge_slave_0) entered forwarding state 18:11:57 executing program 4: unshare(0x40600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000081) [ 1847.322740][T31762] device bridge1364 entered promiscuous mode [ 1847.360056][T31766] device bridge_slave_0 left promiscuous mode 18:11:57 executing program 1: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 1847.403250][T31766] bridge1363: port 1(bridge_slave_0) entered disabled state 18:11:57 executing program 3: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) vmsplice(r0, 0x0, 0x0, 0x0) [ 1847.477959][T31766] bridge1364: port 1(bridge_slave_0) entered blocking state [ 1847.502809][T31766] bridge1364: port 1(bridge_slave_0) entered disabled state [ 1847.567097][T31766] device bridge_slave_0 entered promiscuous mode 18:11:58 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000001680)="cd73054e6b290887", 0x8}], 0x1) [ 1847.619283][T31766] bridge1364: port 1(bridge_slave_0) entered blocking state [ 1847.626637][T31766] bridge1364: port 1(bridge_slave_0) entered forwarding state [ 1847.678276][T31776] device bridge1364 left promiscuous mode [ 1847.724860][T31762] device bridge1364 entered promiscuous mode [ 1847.742952][T31771] device bridge1364 left promiscuous mode 18:11:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6ecc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:58 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0ea49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:58 executing program 4: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 18:11:58 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) 18:11:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x65580000) 18:11:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="b70500d06b7028054c00000000006110180000000000c6000000000000009500000000000000ec8c66c011f0e311860c0fee7d55600c2a8e7bb18214294dfa8feff49dc440f8ca1b01ed7752afd94e9579bc19f16ae516b0725aa46895b40c75c9b96d5a9627436695de2c19739fb58e6bf2eb807db81031ad7d4ab7b3c29a6d14dd27fdefd36befbd2e219451a4618d5118e9aaff5fa82a9f48d007ac447a291d5be3a4ba5424c6006bff6aee5a4ec2a699ea6633aa76c047bb6e1b3f6e32d0f5f7d70516bcc985345e032a58e820a1babb6695c3f809ef2b38a34da76856cac059a5b48d95353d2e699f9850b5f81fd2c2e49ac1c8d795"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 18:11:58 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb81002800884800000000000000000000000000000000400e00480067000001019078e0000002ac141414442cfc81ac14141b7fffffffe0000002000000027f000001000000077f000001000000e6ac1e000100000d6b0f009078080000028b4d5df86bc3ce1ec1e0837353b155f5cf7a80822f04c24d707bb6e9f769149db8c34e507cb5998594561a7df9372198"], 0x0) 18:11:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x400, 0x0, 0x0, 0x0, 0x268, 0x0, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_to_hsr\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @common=@mh={{0x28, 'mh\x00'}, {"e0a4"}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@rand_addr="63bfb7710f568c8a2f94f3bff09814b7", @ipv4, [], [], 'virt_wifi0\x00', 'syz_tun\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 18:11:58 executing program 4: unshare(0x40600) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x0, r1}) [ 1848.144363][T32107] device bridge1123 entered promiscuous mode [ 1848.242460][T32109] device bridge1365 entered promiscuous mode 18:11:58 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x1e00, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1848.316196][T32119] device bridge_slave_0 left promiscuous mode [ 1848.325007][T32119] bridge1122: port 1(bridge_slave_0) entered disabled state [ 1848.339247][T32232] x_tables: ip6_tables: mh match: only valid for protocol 135 18:11:58 executing program 4: unshare(0x40600) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = io_uring_setup(0xdf8, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) ftruncate(0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r1], 0x1) [ 1848.401772][T32119] bridge1123: port 1(bridge_slave_0) entered blocking state 18:11:58 executing program 3: unshare(0x40600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1848.451096][T32119] bridge1123: port 1(bridge_slave_0) entered disabled state [ 1848.468912][T32119] device bridge_slave_0 entered promiscuous mode [ 1848.503785][T32119] bridge1123: port 1(bridge_slave_0) entered blocking state [ 1848.511198][T32119] bridge1123: port 1(bridge_slave_0) entered forwarding state [ 1848.566880][T32128] device bridge_slave_0 left promiscuous mode [ 1848.576578][T32128] bridge1364: port 1(bridge_slave_0) entered disabled state [ 1848.653559][T32128] bridge1365: port 1(bridge_slave_0) entered blocking state [ 1848.696405][T32128] bridge1365: port 1(bridge_slave_0) entered disabled state [ 1848.723792][T32128] device bridge_slave_0 entered promiscuous mode [ 1848.758039][T32128] bridge1365: port 1(bridge_slave_0) entered blocking state [ 1848.765381][T32128] bridge1365: port 1(bridge_slave_0) entered forwarding state [ 1848.819725][T32220] validate_nla: 9 callbacks suppressed [ 1848.819743][T32220] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1848.860935][T32222] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1848.873510][T32222] device bridge1365 left promiscuous mode [ 1848.894494][T32221] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1848.916533][T32220] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:11:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x6fcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:11:59 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c10a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:11:59 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_tgsigqueueinfo(0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x2}) 18:11:59 executing program 3: unshare(0x20020400) r0 = socket$unix(0x1, 0x5, 0x0) setrlimit(0x7, &(0x7f0000000180)) ioctl$sock_proto_private(r0, 0x894c, 0x0) 18:11:59 executing program 4: unshare(0x40600) fchmod(0xffffffffffffffff, 0x0) 18:11:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x68000000) 18:11:59 executing program 4: io_setup(0x83, &(0x7f00000003c0)=0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r0, 0x5, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="41d9787c0b45f0bb58b0cee08d5217c4d660faa0cef88a5f6c7edf2dd221a41d324d563a612f253e58732fd4ea20d00845bf45bb6497f7f1b736ca93cb3d23c89eee7ec76c48d2238072e423fe775914f2f31b7f2fe42b16f5ee31e48f2d5e9002f17fc3887143d080079e7f1220205ad61950d3f9608e20e548a46740f94909238f184cf56a6892fdb87afa879be00f7cf744b19d3d35b16ef2584af36db12cffde50f9fd20a4de18789dab6fa580aafbcdfc15d01ab17225c073381270d58c45c99f3546c3acb90955d3121dbf1793ffa290a362a64b0a81a1f123c13c2ce18c41", 0xe2, 0x8, 0x0, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)="f2254c6c6c184a5e8fff4ebc14533343ddfc21afef0829817aa56d02cf930bb932b41dd42328606087a507f245bb26f430cc6ef030fc7a06f0de43cd5a32525da3098c5a8d0c97746cf0b2e52a56e63c8785b5ccce8591c73db8832746633fb82b30c18ed3b3148fcd8c02071c1e0e7ca1bfbc1b828c4b298cf5849dba7e65503f84122259c9a8771a9ce10dc9c70044f15ec7b623963077e113951ffdc5e42063ffa057ad5d7a8a6db2db713ee783cc8baa0bcb818fb893f20a0c435b72f8722fda8635e7b9fe5f8eedc93e0717e06127368a0284b1899a5a7724beb089ea7d85e7", 0xe2, 0x8, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000500)="9961138e973f07da35896b074bddf1d7bcdd8f60494657ea1018b57f8c136708cb061dc92b9fdc7b1933746988b2f59ae1fffcb0a0a8dfbce0695a4e134bedaa0d71e91aaca4d06ed4679080deb4b652ba66b287ed73a3c31494f2e4566ca1982b5a05abaea4bc5a4e1248669f1410c6b26b538758a554ea180abcf0e58da1e6c323a71099b2de9b6b361b10f1f5def532224257e48227336860d61d9041966528017eb377cdb751a3be86d5d1cd0868152f124bc4cb99dc220a5701", 0xbc, 0x5, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0)="f1cf50941c971c6cc559934386bf556d939f164c9abb4985a49f9be8c89abd1a3567cfb659f90a20673bb0a21831d3df48a67dca99c9ca204770a49049f301a1107f533e4b48df50bd6c8553ccc6949268d3fbf29aaf740bf6b6b320fc80b7a393a8bb875f6e439327d8fcee1a74eaebd232a640b4c24bdf204793a8a19f91504a2a8f084adfd1", 0x87, 0x80000100000000, 0x0, 0x2}]) [ 1849.151173][T32261] device bridge1124 entered promiscuous mode [ 1849.218022][T32267] device bridge1366 entered promiscuous mode [ 1849.252435][T32274] device bridge_slave_0 left promiscuous mode 18:11:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) [ 1849.271997][T32274] bridge1123: port 1(bridge_slave_0) entered disabled state 18:11:59 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5405, 0x0) [ 1849.359457][T32274] bridge1124: port 1(bridge_slave_0) entered blocking state [ 1849.374065][T32274] bridge1124: port 1(bridge_slave_0) entered disabled state [ 1849.401274][T32274] device bridge_slave_0 entered promiscuous mode [ 1849.413640][T32274] bridge1124: port 1(bridge_slave_0) entered blocking state [ 1849.421080][T32274] bridge1124: port 1(bridge_slave_0) entered forwarding state 18:11:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28001) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='C\t\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000742a000000000b000000140006000400020008000100e5987200000000040002002c000200080002000000000008000100000000000800010000000000080001000000000008000100010001001400060008000100000000000400020004000200500007000c00040080000000000000000c08000100000000000c00040000000000000000000800020000eeffff0b00030000000000000000000c00030001000152"], 0x3}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 18:12:00 executing program 3: unshare(0x40600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) r3 = dup2(r1, r0) r4 = dup(r3) getpeername$packet(r4, 0x0, 0x0) [ 1849.492378][T32280] device bridge_slave_0 left promiscuous mode [ 1849.498740][T32280] bridge1365: port 1(bridge_slave_0) entered disabled state [ 1849.567165][T32280] bridge1366: port 1(bridge_slave_0) entered blocking state [ 1849.595774][T32280] bridge1366: port 1(bridge_slave_0) entered disabled state [ 1849.631620][T32280] device bridge_slave_0 entered promiscuous mode [ 1849.646209][T32280] bridge1366: port 1(bridge_slave_0) entered blocking state [ 1849.653636][T32280] bridge1366: port 1(bridge_slave_0) entered forwarding state [ 1849.670949][T32261] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1849.717655][T32267] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1849.770314][T32267] device bridge1366 left promiscuous mode [ 1849.802347][T32274] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b707000001ffffff8570000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) [ 1849.837646][T32280] device bridge1366 entered promiscuous mode [ 1849.867421][T32267] device bridge_slave_0 left promiscuous mode [ 1849.890494][T32267] bridge1366: port 1(bridge_slave_0) entered disabled state 18:12:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x70cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1849.979447][ T330] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:12:00 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c11a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00', 0x0, 0x2}, 0x48) 18:12:00 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 18:12:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x2, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 18:12:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6c000000) 18:12:00 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='user.syz\x00', 0x0, 0x0) 18:12:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000500)=ANY=[], 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 1850.319623][ T340] device bridge1125 entered promiscuous mode 18:12:00 executing program 1: unshare(0x20020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) readv(r0, 0x0, 0x0) [ 1850.379905][ T346] device bridge_slave_0 left promiscuous mode [ 1850.388275][ T346] bridge1124: port 1(bridge_slave_0) entered disabled state [ 1850.468853][ T346] bridge1125: port 1(bridge_slave_0) entered blocking state [ 1850.482732][ T346] bridge1125: port 1(bridge_slave_0) entered disabled state [ 1850.500098][ T346] device bridge_slave_0 entered promiscuous mode [ 1850.521241][ T346] bridge1125: port 1(bridge_slave_0) entered blocking state [ 1850.528580][ T346] bridge1125: port 1(bridge_slave_0) entered forwarding state [ 1850.556277][ T349] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:01 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000240)='./file0\x00') [ 1850.620532][ T357] device bridge1368 entered promiscuous mode [ 1850.709210][ T359] bridge1368: port 1(bridge_slave_0) entered blocking state [ 1850.716529][ T359] bridge1368: port 1(bridge_slave_0) entered disabled state [ 1850.729587][ T359] device bridge_slave_0 entered promiscuous mode [ 1850.750188][ T359] bridge1368: port 1(bridge_slave_0) entered blocking state 18:12:01 executing program 1: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@delsa={0x28, 0x11, 0x11, 0x0, 0x0, {@in6=@mcast1}}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) [ 1850.757529][ T359] bridge1368: port 1(bridge_slave_0) entered forwarding state 18:12:01 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1850.838101][ T432] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1850.846478][ T432] device bridge1368 left promiscuous mode [ 1850.943554][ T357] device bridge1368 entered promiscuous mode [ 1851.018420][ T364] device bridge1368 left promiscuous mode 18:12:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x71cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:01 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c12a49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x0, 0x6, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 18:12:01 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 18:12:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x74000000) 18:12:01 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) 18:12:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) sendfile(r2, r2, 0x0, 0x0) [ 1851.313877][ T798] device bridge1126 entered promiscuous mode [ 1851.378115][ T805] device bridge_slave_0 left promiscuous mode [ 1851.414452][ T805] bridge1125: port 1(bridge_slave_0) entered disabled state 18:12:01 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1851.472081][ T805] bridge1126: port 1(bridge_slave_0) entered blocking state [ 1851.482994][ T805] bridge1126: port 1(bridge_slave_0) entered disabled state [ 1851.526927][ T805] device bridge_slave_0 entered promiscuous mode [ 1851.558451][ T805] bridge1126: port 1(bridge_slave_0) entered blocking state [ 1851.565797][ T805] bridge1126: port 1(bridge_slave_0) entered forwarding state 18:12:02 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1851.713096][ T807] device bridge1369 entered promiscuous mode 18:12:02 executing program 3: unshare(0x40600) fchmod(0xffffffffffffffff, 0x0) [ 1851.766155][ T811] device bridge_slave_0 left promiscuous mode [ 1851.778288][ T811] bridge1368: port 1(bridge_slave_0) entered disabled state [ 1851.827346][ T811] bridge1369: port 1(bridge_slave_0) entered blocking state [ 1851.838377][ T811] bridge1369: port 1(bridge_slave_0) entered disabled state [ 1851.859509][ T811] device bridge_slave_0 entered promiscuous mode 18:12:02 executing program 3: unshare(0x40600) fchmod(0xffffffffffffffff, 0x0) [ 1851.875361][ T811] bridge1369: port 1(bridge_slave_0) entered blocking state [ 1851.882718][ T811] bridge1369: port 1(bridge_slave_0) entered forwarding state [ 1851.939752][ T850] device bridge1369 left promiscuous mode 18:12:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$int_in(r1, 0x5421, &(0x7f0000000040)) [ 1851.991352][ T811] device bridge1369 entered promiscuous mode [ 1852.012342][ T807] device bridge_slave_0 left promiscuous mode [ 1852.033062][ T807] bridge1369: port 1(bridge_slave_0) entered disabled state 18:12:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x72cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:02 executing program 3: unshare(0x40600) fchmod(0xffffffffffffffff, 0x0) 18:12:02 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c3aa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:02 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 18:12:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7a000000) 18:12:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1852.355302][ T948] device bridge1127 entered promiscuous mode [ 1852.377182][ T968] device bridge_slave_0 left promiscuous mode [ 1852.387218][ T968] bridge1126: port 1(bridge_slave_0) entered disabled state 18:12:02 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FICLONE(r0, 0x40049409, r0) [ 1852.450627][ T968] bridge1127: port 1(bridge_slave_0) entered blocking state [ 1852.495324][ T968] bridge1127: port 1(bridge_slave_0) entered disabled state [ 1852.522891][ T968] device bridge_slave_0 entered promiscuous mode 18:12:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) fchmod(r0, 0x0) 18:12:03 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1852.552833][ T968] bridge1127: port 1(bridge_slave_0) entered blocking state [ 1852.560331][ T968] bridge1127: port 1(bridge_slave_0) entered forwarding state 18:12:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) fchmod(r0, 0x0) [ 1852.724945][ T1055] device bridge1371 entered promiscuous mode [ 1852.761458][ T1059] bridge1371: port 1(bridge_slave_0) entered blocking state 18:12:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000014d000/0x3000)=nil, 0x3000, 0x3) [ 1852.783527][ T1059] bridge1371: port 1(bridge_slave_0) entered disabled state [ 1852.795271][ T1059] device bridge_slave_0 entered promiscuous mode [ 1852.803774][ T1059] bridge1371: port 1(bridge_slave_0) entered blocking state [ 1852.811125][ T1059] bridge1371: port 1(bridge_slave_0) entered forwarding state 18:12:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) fchmod(r0, 0x0) [ 1852.922827][ T1064] device bridge1371 left promiscuous mode [ 1852.988188][ T1055] device bridge1371 entered promiscuous mode [ 1853.066462][ T1064] device bridge1371 left promiscuous mode 18:12:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x73cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:03 executing program 1: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, 0x0) 18:12:03 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c5da49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:03 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 18:12:03 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(0xffffffffffffffff, 0x0) 18:12:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x81000000) 18:12:03 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x542e, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1853.382128][ T1197] device bridge1128 entered promiscuous mode [ 1853.403645][ T1199] device bridge_slave_0 left promiscuous mode 18:12:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2ba}, 0x48) [ 1853.480800][ T1199] bridge1127: port 1(bridge_slave_0) entered disabled state 18:12:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 1853.557510][ T1199] bridge1128: port 1(bridge_slave_0) entered blocking state [ 1853.565378][ T1199] bridge1128: port 1(bridge_slave_0) entered disabled state [ 1853.575315][ T1199] device bridge_slave_0 entered promiscuous mode [ 1853.585671][ T1199] bridge1128: port 1(bridge_slave_0) entered blocking state [ 1853.593137][ T1199] bridge1128: port 1(bridge_slave_0) entered forwarding state 18:12:04 executing program 1: write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendto$inet(r0, 0x0, 0x78, 0x1000000020000000, &(0x7f0000000080), 0x10) [ 1853.702530][ T1206] device bridge1372 entered promiscuous mode 18:12:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 1853.750097][ T1211] device bridge_slave_0 left promiscuous mode [ 1853.756396][ T1211] bridge1371: port 1(bridge_slave_0) entered disabled state [ 1853.838741][ T1211] bridge1372: port 1(bridge_slave_0) entered blocking state [ 1853.849378][ T1211] bridge1372: port 1(bridge_slave_0) entered disabled state [ 1853.865639][ T1211] device bridge_slave_0 entered promiscuous mode [ 1853.883140][ T1211] bridge1372: port 1(bridge_slave_0) entered blocking state [ 1853.890492][ T1211] bridge1372: port 1(bridge_slave_0) entered forwarding state 18:12:04 executing program 1: io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/784], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x341, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 1853.945625][ T1199] validate_nla: 11 callbacks suppressed [ 1853.945638][ T1199] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x74000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) unshare(0x40600) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) [ 1854.227212][ T1554] device bridge1129 entered promiscuous mode [ 1854.288160][ T1562] device bridge_slave_0 left promiscuous mode [ 1854.295868][ T1562] bridge1128: port 1(bridge_slave_0) entered disabled state [ 1854.375787][ T1562] bridge1129: port 1(bridge_slave_0) entered blocking state [ 1854.402089][ T1562] bridge1129: port 1(bridge_slave_0) entered disabled state [ 1854.421534][ T1562] device bridge_slave_0 entered promiscuous mode [ 1854.433415][ T1562] bridge1129: port 1(bridge_slave_0) entered blocking state [ 1854.440796][ T1562] bridge1129: port 1(bridge_slave_0) entered forwarding state 18:12:05 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x3225}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x88a8ffff) 18:12:05 executing program 1: unshare(0x40600) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:12:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@mcast2, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) 18:12:05 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5437, 0x0) [ 1854.495410][ T1554] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1854.517629][ T1554] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000002070000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) 18:12:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x74cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:05 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x80045440, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "b562edcccd023e892f6bac57d5674b7da1a4f3"}) [ 1854.704528][ T1576] device bridge1373 entered promiscuous mode 18:12:05 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5417, 0x0) 18:12:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c80)={'vcan0\x00'}) [ 1854.836583][ T1579] device bridge_slave_0 left promiscuous mode [ 1854.888265][ T1579] bridge1372: port 1(bridge_slave_0) entered disabled state 18:12:05 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1854.980911][ T1579] bridge1373: port 1(bridge_slave_0) entered blocking state [ 1855.024864][ T1579] bridge1373: port 1(bridge_slave_0) entered disabled state [ 1855.045708][ T1579] device bridge_slave_0 entered promiscuous mode [ 1855.055453][ T1579] bridge1373: port 1(bridge_slave_0) entered blocking state [ 1855.062870][ T1579] bridge1373: port 1(bridge_slave_0) entered forwarding state 18:12:05 executing program 3: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) [ 1855.125364][ T1589] device bridge1130 entered promiscuous mode [ 1855.166305][ T1593] device bridge_slave_0 left promiscuous mode [ 1855.206914][ T1593] bridge1129: port 1(bridge_slave_0) entered disabled state [ 1855.289434][ T1593] bridge1130: port 1(bridge_slave_0) entered blocking state [ 1855.296946][ T1593] bridge1130: port 1(bridge_slave_0) entered disabled state [ 1855.308531][ T1593] device bridge_slave_0 entered promiscuous mode [ 1855.316769][ T1593] bridge1130: port 1(bridge_slave_0) entered blocking state [ 1855.324175][ T1593] bridge1130: port 1(bridge_slave_0) entered forwarding state [ 1855.342605][ T1595] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1855.417089][ T1593] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:06 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x325d}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004880)=[{{&(0x7f0000000100)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e23, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000004b00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}], 0x20}}], 0x2, 0x0) 18:12:06 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) vmsplice(r1, &(0x7f0000003680)=[{&(0x7f0000000280)="9a", 0x1}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 18:12:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000080), 0x4) 18:12:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x9effffff) 18:12:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x75cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1855.656823][ T1833] device bridge1374 entered promiscuous mode 18:12:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYRES64, @ANYRES32], 0x10) 18:12:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x300, 0x5, 0x0, r1, 0x0}]) [ 1855.700563][ T1885] device bridge_slave_0 left promiscuous mode [ 1855.717162][ T1885] bridge1373: port 1(bridge_slave_0) entered disabled state [ 1855.786791][ T1885] bridge1374: port 1(bridge_slave_0) entered blocking state [ 1855.834888][ T1885] bridge1374: port 1(bridge_slave_0) entered disabled state [ 1855.858868][ T1885] device bridge_slave_0 entered promiscuous mode [ 1855.873287][ T1885] bridge1374: port 1(bridge_slave_0) entered blocking state [ 1855.880717][ T1885] bridge1374: port 1(bridge_slave_0) entered forwarding state 18:12:06 executing program 3: unshare(0x40600) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x0) [ 1855.953638][ T1893] device bridge1131 entered promiscuous mode [ 1856.002693][ T1947] device bridge_slave_0 left promiscuous mode [ 1856.016306][ T1947] bridge1130: port 1(bridge_slave_0) entered disabled state 18:12:06 executing program 1: unshare(0x40600) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 1856.081811][ T1947] bridge1131: port 1(bridge_slave_0) entered blocking state [ 1856.120525][ T1947] bridge1131: port 1(bridge_slave_0) entered disabled state [ 1856.151671][ T1947] device bridge_slave_0 entered promiscuous mode [ 1856.190455][ T1947] bridge1131: port 1(bridge_slave_0) entered blocking state 18:12:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_netdev_private(r1, 0x89f9, &(0x7f0000000380)="1df271fbb1e362e93a") 18:12:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x2, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) [ 1856.197913][ T1947] bridge1131: port 1(bridge_slave_0) entered forwarding state [ 1856.254518][ T1948] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1856.329181][ T1947] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:07 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b323b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xb8a03eda) 18:12:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x6, 0x5, 0x0, 0x0, 0x90}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd55, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 18:12:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x76cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:07 executing program 1: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0xc0045878, 0x0) 18:12:07 executing program 4: unshare(0x40600) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) readahead(r0, 0x0, 0x0) 18:12:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)) 18:12:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000409500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d08ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2]}, 0x48) [ 1856.804951][ T2384] device bridge1375 entered promiscuous mode 18:12:07 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00000005c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) [ 1856.914008][ T2396] device bridge1132 entered promiscuous mode 18:12:07 executing program 3: unshare(0x40600) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) [ 1856.989352][ T2414] device bridge_slave_0 left promiscuous mode [ 1857.003219][ T2414] bridge1374: port 1(bridge_slave_0) entered disabled state 18:12:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$unix(r1, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, 0x0, 0x0) 18:12:07 executing program 1: r0 = eventfd2(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 1857.088066][ T2414] bridge1375: port 1(bridge_slave_0) entered blocking state [ 1857.119318][ T2414] bridge1375: port 1(bridge_slave_0) entered disabled state [ 1857.181399][ T2414] device bridge_slave_0 entered promiscuous mode [ 1857.224179][ T2414] bridge1375: port 1(bridge_slave_0) entered blocking state [ 1857.231514][ T2414] bridge1375: port 1(bridge_slave_0) entered forwarding state [ 1857.363333][ T2492] device bridge_slave_0 left promiscuous mode [ 1857.374045][ T2492] bridge1131: port 1(bridge_slave_0) entered disabled state [ 1857.479474][ T2492] bridge1132: port 1(bridge_slave_0) entered blocking state [ 1857.488725][ T2492] bridge1132: port 1(bridge_slave_0) entered disabled state [ 1857.496910][ T2492] device bridge_slave_0 entered promiscuous mode [ 1857.505699][ T2492] bridge1132: port 1(bridge_slave_0) entered blocking state [ 1857.513108][ T2492] bridge1132: port 1(bridge_slave_0) entered forwarding state [ 1857.536025][ T2495] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1857.606364][ T2492] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:08 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b325b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:08 executing program 3: r0 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername$unix(r0, 0x0, &(0x7f0000000180)) 18:12:08 executing program 4: r0 = socket$nl_netfilter(0xa, 0x3, 0x3a) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 18:12:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x618f267ea869d4eb, 0x0) 18:12:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xc3ffffff) 18:12:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x77cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:08 executing program 4: unshare(0x40600) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 18:12:08 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000200000000613ebf80395a6bf20aa73dc38e1875673422335d125f739d7de461f3d52ee905e9f4d0c4a9482ac0c6c608858cb5d0fff720cd52833214ad64421b590b719093ec676200b7f81b559bd6773650418735fd55248afa7ad9aea09e4d666fd0b87338282c809c2f3182ee2801064eafb87f565e420ef84c2b2e8bc328a778345f00c78e4292f9732d1f0af7f87fe42a1094b5ea0783a0d44a18a8d8186d808f10e8db2458d6d3a66497c6d4525226257cfb5daea35cc56c781dd8871f0a5ea808d58c52ebfc178ea22cdc6b338c0787a0d1de38c8a774732843eb517d9b4f3b58823c6266bffec1ac192a88a78a1a42f50573411a98fee12e5f944cc5ef4790605c7933b2b9c4a2bbfeee22a62b1326224d07a31b3a375e1e85e0f270d265849d37c18ad32436087b4bd429b2050aa869afbdf2e18f34e0d0baa1b9bd6129d2104a378b831b5970f8616403c5276088c136b98b5d44ef619745984cc76a34409b90cca6fa1ca888da1e12805894c163ad3aa25edb59a4f5d7d533fa31489b3c270f9544958c81adcfa70e57a30000000000"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 18:12:08 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x100, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1857.892881][ T3177] device bridge1376 entered promiscuous mode [ 1857.942995][ T3178] device bridge1134 entered promiscuous mode [ 1858.031614][ T3189] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:08 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) setsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0xfffffffffffffe51) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, 0x0) keyctl$clear(0x7, 0x0) request_key(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x8) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) ioctl$TCSETXW(r4, 0x5435, &(0x7f0000000300)={0x7, 0x7, [0x8f, 0x2, 0x6, 0x2, 0x1], 0x101}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_config_ext={0x0, 0x200}, 0x5046, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r5) r6 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f0000000000)={0x0, 0x1a3, &(0x7f000082f000)}) r7 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r7, 0x80104592, &(0x7f0000000000)={0x0, 0x1a3, &(0x7f000082f000)}) dup3(r6, r7, 0x80000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 1858.095966][ T3180] device bridge_slave_0 left promiscuous mode [ 1858.103899][ T3180] bridge1375: port 1(bridge_slave_0) entered disabled state [ 1858.176758][ T3180] bridge1376: port 1(bridge_slave_0) entered blocking state [ 1858.204035][ T3180] bridge1376: port 1(bridge_slave_0) entered disabled state 18:12:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getdents(0xffffffffffffffff, &(0x7f0000000000)=""/46, 0x15092e2a1832a052) write$ppp(0xffffffffffffffff, &(0x7f00000002c0)="03c2cc8c4f31b6753d4ec731c64945e0246542ab60f20678de1f60aadcfe86038cf01cab8c10bc3210758578bf31eeecfdbd03a8773136a4ebb22452c195a3df8b986a2b120238598748584f649ffe7dab4e48aff95cfa133be092ee2353f6ce4c8afb5a78ac864e9b6ae1f4e17e6bbce5df4317e42b27e467687d3e3e2878cb8795af3120e4ef05598ca335880611775b636aa885f37d049c4efdddc1b2730eef", 0xa1) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xfffffffffffffffc}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = epoll_create1(0x0) epoll_pwait(r5, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080)={0x1}, 0x8) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/2202], 0x89a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, &(0x7f0000004080)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) open(&(0x7f0000000100)='./file0\x00', 0x80000, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x42, r6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) [ 1858.229297][ T3180] device bridge_slave_0 entered promiscuous mode [ 1858.247223][ T3180] bridge1376: port 1(bridge_slave_0) entered blocking state [ 1858.254587][ T3180] bridge1376: port 1(bridge_slave_0) entered forwarding state [ 1858.334680][ T3185] device bridge_slave_0 left promiscuous mode [ 1858.354615][ T3185] bridge1132: port 1(bridge_slave_0) entered disabled state [ 1858.451287][ T3185] bridge1134: port 1(bridge_slave_0) entered blocking state [ 1858.484537][ T3185] bridge1134: port 1(bridge_slave_0) entered disabled state 18:12:09 executing program 3: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000140), 0x8) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0xaa, 0x1ffffffe) [ 1858.500549][ T3185] device bridge_slave_0 entered promiscuous mode [ 1858.515186][ T3185] bridge1134: port 1(bridge_slave_0) entered blocking state [ 1858.522540][ T3185] bridge1134: port 1(bridge_slave_0) entered forwarding state 18:12:09 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b33ab4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xda3ea0b8) 18:12:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) futex(&(0x7f0000000040), 0x1, 0x0, 0x0, 0x0, 0x0) 18:12:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x78cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:09 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') getpeername$packet(r4, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f00000000c0)={0x5, 0xba, 0x1}) perf_event_open(0x0, 0x0, 0xd, r4, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x840000000002, 0x0, 0x200000000000ff) socket$unix(0x1, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@rc={0x1f, {0x0, 0x4, 0x0, 0x0, 0x0, 0x9f}, 0x6}, 0x80) r6 = socket$inet(0x2, 0x0, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r6, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003c80), 0x38e, 0x62, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) accept(r1, &(0x7f0000001b80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001c00)=0xfffffffffffffe5f) r9 = syz_open_dev$usbmon(0x0, 0xffffffffffffffff, 0x402) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, r10}, 0xc) sendmmsg$inet(r5, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x3, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)=[{0x0}, {&(0x7f0000001dc0)="6b657b5f784f6a8d3f204d59a2db49760c5472cd325e2b65871fb2a15899555c4cad9fe9", 0x24}, {&(0x7f0000001e00)="2a3dbd05bf4cb07e2438073d32b019040ce1216e3dbe7d201d687924b842ed2e39add49f48894b79020b40e24e62889419def1e7438794b52d60ce5ef7d4f32317afd3fe9a452e2745686dd1825b16c692c8b3bf5ce325b05f011993e443bcd3b0562c38970b99f3aa3cd9ad966946e2a01e23aefc9fd6dd4a5e1feb1ec4", 0x7e}, {&(0x7f0000001e80)}], 0x4, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @broadcast, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x68}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af6966f3d513f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569d", 0x21}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x129}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="98c45fb1f9d40f", 0x7}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) getsockname(r5, &(0x7f00000003c0)=@tipc=@id, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x105, &(0x7f00000001c0)=0x0) io_submit(r12, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r11, &(0x7f0000000000), 0x10000}]) r13 = getpid() rt_tgsigqueueinfo(r13, r13, 0x16, &(0x7f00000002c0)) ptrace(0x10, r13) ptrace$pokeuser(0x6, r13, 0x388, 0xfffffffffffffffe) 18:12:09 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000040}, 0xc) [ 1859.083935][ T3709] device bridge1377 entered promiscuous mode [ 1859.146956][ T3714] device bridge_slave_0 left promiscuous mode [ 1859.162816][ T3714] bridge1376: port 1(bridge_slave_0) entered disabled state 18:12:09 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') getpeername$packet(r4, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f00000000c0)={0x5, 0xba, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0xffe1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, r4, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x840000000002, 0x3, 0x200000000000ff) r6 = socket$unix(0x1, 0x0, 0x0) connect(r6, &(0x7f0000000000)=@rc={0x1f, {0x0, 0x4, 0x0, 0x0, 0x1, 0x9f}, 0x6}, 0x80) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r7, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003c80), 0x38e, 0x62, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) r9 = accept(r1, &(0x7f0000001b80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001c00)=0xfffffffffffffe5f) r11 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x402) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r12}, 0xc) sendmmsg$inet(r5, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @rand_addr=0x3, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001d00)="6e86192b3fadbbb74663e482d44f10dd67341f5360ba5284fd02713f7393ffbbb664acdf32eae6ac83347a80645a84e5c1041e2d9e37ad21c232856c810913be9ca0a483d1f86851488a8109ec20d2153c34d0ebaaf97c2215f984a769fce1ba9128afcb76f1b1a5224c5f8754fc2313b7528cd1fbd4ccffb73e57511470c097fd2bf6582d0fa521430979fd513febd07b1405ef1a8f14328594a56b69f1de1bd810caee01b4b1e5b8fa4f83", 0xac}, {&(0x7f0000001dc0)="6b657b5f784f6a8d3f204d59a2db49760c5472cd325e2b65871fb2a15899555c4cad9fe9", 0x24}, {&(0x7f0000001e00)="2a3dbd05bf4cb07e2438073d32b019040ce1216e3dbe7d201d687924b842ed2e39add49f48894b79020b40e24e62889419def1e7438794b52d60ce5ef7d4f32317afd3fe9a452e2745686dd1825b16c692c8b3bf5ce325b05f011993e443bcd3b0562c38970b99f3aa3cd9ad966946e2a01e23aefc9fd6dd4a5e1feb1ec4", 0x7e}, {&(0x7f0000001e80)="f3be3bb62ed6d05e87404d89b26a3faf0ad980e0bdcbfdb620167ff5d72cf58a5e05f3768ca65a27cf5e3d4ae5663d653b28c5cbffde164378915a68846452e01daebdff4676ee664474e74956d984a14d8471d919efa4f603850d70b3eedbe69e274a57ad1430", 0x67}], 0x4, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @broadcast, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x68}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af6966f3d513f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569df37b073c12353fc2b901", 0x2b}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfe}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="98c45fb1f9d40f", 0x7}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) getsockname(r5, &(0x7f00000003c0)=@tipc=@id, &(0x7f0000000180)=0x218) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r13 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r13, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x105, &(0x7f00000001c0)=0x0) io_submit(r14, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r13, &(0x7f0000000000), 0x10000}]) r15 = getpid() rt_tgsigqueueinfo(r15, r15, 0x16, &(0x7f00000002c0)) ptrace(0x10, r15) ptrace$pokeuser(0x6, r15, 0x388, 0xfffffffffffffffe) [ 1859.252690][ T3714] bridge1377: port 1(bridge_slave_0) entered blocking state [ 1859.270282][ T3714] bridge1377: port 1(bridge_slave_0) entered disabled state [ 1859.307502][ T3714] device bridge_slave_0 entered promiscuous mode [ 1859.319872][ T3714] bridge1377: port 1(bridge_slave_0) entered blocking state [ 1859.327259][ T3714] bridge1377: port 1(bridge_slave_0) entered forwarding state 18:12:09 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = dup2(r0, r3) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) ioctl$sock_bt_hci(r4, 0x400448cb, 0x0) 18:12:09 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 18:12:09 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') getpeername$packet(r4, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f00000000c0)={0x5, 0xba, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0xffe1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, r4, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x840000000002, 0x3, 0x200000000000ff) r6 = socket$unix(0x1, 0x0, 0x0) connect(r6, &(0x7f0000000000)=@rc={0x1f, {0x0, 0x4, 0x0, 0x0, 0x1, 0x9f}, 0x6}, 0x80) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r7, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000003c80), 0x38e, 0x62, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@remote, @rand_addr, 0x0}, &(0x7f0000000700)=0xc) r9 = accept(r1, &(0x7f0000001b80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001c00)=0xfffffffffffffe5f) r11 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x402) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') preadv(r12, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r13}, 0xc) sendmmsg$inet(r5, &(0x7f0000002440)=[{{&(0x7f0000000100)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000001a40), 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @rand_addr=0x3, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9a}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @multicast2, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001d00)="6e86192b3fadbbb74663e482d44f10dd67341f5360ba5284fd02713f7393ffbbb664acdf32eae6ac83347a80645a84e5c1041e2d9e37ad21c232856c810913be9ca0a483d1f86851488a8109ec20d2153c34d0ebaaf97c2215f984a769fce1ba9128afcb76f1b1a5224c5f8754fc2313b7528cd1fbd4ccffb73e57511470c097fd2bf6582d0fa521430979fd513febd07b1405ef1a8f14328594a56b69f1de1bd810caee01b4b1e5b8fa4f83", 0xac}, {&(0x7f0000001dc0)="6b657b5f784f6a8d3f204d59a2db49760c5472cd325e2b65871fb2a15899555c4cad9fe9", 0x24}, {&(0x7f0000001e00)="2a3dbd05bf4cb07e2438073d32b019040ce1216e3dbe7d201d687924b842ed2e39add49f48894b79020b40e24e62889419def1e7438794b52d60ce5ef7d4f32317afd3fe9a452e2745686dd1825b16c692c8b3bf5ce325b05f011993e443bcd3b0562c38970b99f3aa3cd9ad966946e2a01e23aefc9fd6dd4a5e1feb1ec4", 0x7e}, {&(0x7f0000001e80)="f3be3bb62ed6d05e87404d89b26a3faf0ad980e0bdcbfdb620167ff5d72cf58a5e05f3768ca65a27cf5e3d4ae5663d653b28c5cbffde164378915a68846452e01daebdff4676ee664474e74956d984a14d8471d919efa4f603850d70b3eedbe69e274a57ad1430", 0x67}], 0x4, &(0x7f0000001f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @broadcast, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x68}}, {{&(0x7f0000001fc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002200)=[{&(0x7f0000002000)="0164bb1b3cee91d2d23fd07164e71a7801f5084d8bbddc585359319c5af5ff173d56777cbbacaf7a2230a3decfd93551c04a6802ecc89b510747e5a0a2386a08d8adcb6d093332537d945054cbe7622106975a139d6ea1d907c98abd45fd30b082028e3bbd7f4297240740d6e94e6b58f7c9702fed673cfc90a7d126ffefbb22168cda7311efeef208809a6d6f621c0fa2067af03ce38f8205e9988f461be9c70b7d59ff93ff09decf74a9e55430468f15e22cd1fd56879a2f20ab8f1fd80135e9ac1e61f7e87fd6", 0xc8}, {&(0x7f0000002100)="9ded0933fadacbada31ad7b75482074167847b16d8ccdde9b9012cb97c10a85ff942c8f98c1d075f7d5a3367a81d5afc07e162b62f982ed1e7a362fe41e53bcd5d8ddbe0886a755300da5f4ce107c1948f829061f5e99af6966f3d513f3296206702616904a1dcba056f1854deba8c64262e5ced27d343", 0x77}, {&(0x7f0000002180)="6209ed67941216fdf598146857a68b5a81019042838b95e9512b2b0641e40e569df37b073c12353fc2b901", 0x2b}, {&(0x7f00000021c0)="857bc0bd4d221353bcdbb9b4ffc9fc825e79ab2508b87a902028f0b971dee8b8180b46629feb2882", 0x28}], 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfe}}, {{&(0x7f0000002280)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f00000022c0)="247badb355c651b14744280a13c3b8ffcb44beacbfe5f126189e667bcf69a0bc7cb25e2358332fb486915eec8cce7775876b447a45deb35e5b3f8c346e1b008cd8f583159970ca105cd1389d417e87c3383a2b893230e3635eb35502a705832a2d60d7a39dbac94ecca5ffd0da556dcef4ba376eb09519ad2820a60ff79f8a661d", 0x81}, {&(0x7f0000002380)="98c45fb1f9d40f", 0x7}, {&(0x7f00000023c0)}], 0x3}}], 0x4, 0x14006081) getsockname(r5, &(0x7f00000003c0)=@tipc=@id, &(0x7f0000000180)=0x218) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r14 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r14, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x105, &(0x7f00000001c0)=0x0) io_submit(r15, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r14, &(0x7f0000000000), 0x10000}]) r16 = getpid() rt_tgsigqueueinfo(r16, r16, 0x16, &(0x7f00000002c0)) ptrace(0x10, r16) ptrace$pokeuser(0x6, r16, 0x388, 0xfffffffffffffffe) [ 1859.502592][ T3716] device bridge1135 entered promiscuous mode 18:12:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xf0ffffff) [ 1859.639100][ T3834] device bridge_slave_0 left promiscuous mode [ 1859.652946][ T3834] bridge1134: port 1(bridge_slave_0) entered disabled state 18:12:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) [ 1859.789015][ T3834] bridge1135: port 1(bridge_slave_0) entered blocking state [ 1859.828965][ T3834] bridge1135: port 1(bridge_slave_0) entered disabled state [ 1859.857414][ T3834] device bridge_slave_0 entered promiscuous mode [ 1859.876138][ T3834] bridge1135: port 1(bridge_slave_0) entered blocking state [ 1859.883505][ T3834] bridge1135: port 1(bridge_slave_0) entered forwarding state [ 1859.932256][ T3839] validate_nla: 1 callbacks suppressed [ 1859.932266][ T3839] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1860.083302][ T4369] device bridge1378 entered promiscuous mode [ 1860.110417][ T4372] device bridge_slave_0 left promiscuous mode [ 1860.116676][ T4372] bridge1377: port 1(bridge_slave_0) entered disabled state [ 1860.164250][ T4372] bridge1378: port 1(bridge_slave_0) entered blocking state [ 1860.171691][ T4372] bridge1378: port 1(bridge_slave_0) entered disabled state [ 1860.179642][ T4372] device bridge_slave_0 entered promiscuous mode [ 1860.187024][ T4372] bridge1378: port 1(bridge_slave_0) entered blocking state [ 1860.194398][ T4372] bridge1378: port 1(bridge_slave_0) entered forwarding state 18:12:10 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b3c0b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:10 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0xffffffae, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe, 0x6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, &(0x7f0000000000)) socket(0x10, 0x1a6273f2b2e289f7, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:12:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = dup2(r0, r3) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) ioctl$sock_bt_hci(r4, 0x800448f0, 0x0) [ 1860.226400][ T4383] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x79cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup2(r0, r1) ioctl$sock_bt_hci(r2, 0x400448e4, &(0x7f0000000000)) 18:12:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfcffffff) 18:12:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port1\x00'}) 18:12:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 18:12:11 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000940)='auxv\x00') sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r5, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x80000}, 0x0, 0x8, 0xffffffffffffffff, 0x601ca79bbf5ddeaf) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001240)={0x4, 0x70, 0x0, 0x80, 0x3f, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0xffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f00000001c0)='f2fs\x00', 0x0, 0x0) socket(0x31, 0x80000, 0x3) socket(0x1, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) close(0xffffffffffffffff) creat(&(0x7f0000000340)='./bus\x00', 0x135) gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffffffffffe28) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000080)={0x3, 0x2}) accept$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x0, @empty}, &(0x7f0000000700)=0x10) socket$inet(0x2, 0x4000000000000001, 0x0) socket$unix(0x1, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r8 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000300)='}', 0x1, 0xfffffffffffffffd) r9 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r9, r8, r10}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\x00'}}) write$P9_RREAD(r7, &(0x7f0000000300)=ANY=[@ANYRES32=r8], 0x4) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0xd000000, r7, 0x0, 0x8}) [ 1860.564450][ T4603] device bridge1379 entered promiscuous mode 18:12:11 executing program 3: [ 1860.675850][ T4607] device bridge_slave_0 left promiscuous mode [ 1860.703372][ T4607] bridge1378: port 1(bridge_slave_0) entered disabled state 18:12:11 executing program 1: [ 1860.791734][ T4607] bridge1379: port 1(bridge_slave_0) entered blocking state [ 1860.817111][ T4607] bridge1379: port 1(bridge_slave_0) entered disabled state 18:12:11 executing program 4: [ 1860.843647][ T4607] device bridge_slave_0 entered promiscuous mode [ 1860.873349][ T4607] bridge1379: port 1(bridge_slave_0) entered blocking state [ 1860.880688][ T4607] bridge1379: port 1(bridge_slave_0) entered forwarding state [ 1860.995632][ T4609] device bridge1136 entered promiscuous mode [ 1861.039375][ T4611] device bridge_slave_0 left promiscuous mode [ 1861.077160][ T4611] bridge1135: port 1(bridge_slave_0) entered disabled state [ 1861.167302][ T4611] bridge1136: port 1(bridge_slave_0) entered blocking state [ 1861.174916][ T4611] bridge1136: port 1(bridge_slave_0) entered disabled state [ 1861.183207][ T4611] device bridge_slave_0 entered promiscuous mode [ 1861.193080][ T4611] bridge1136: port 1(bridge_slave_0) entered blocking state [ 1861.200518][ T4611] bridge1136: port 1(bridge_slave_0) entered forwarding state [ 1861.276772][ T4618] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1861.342578][ T4611] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:11 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62348f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:11 executing program 3: 18:12:11 executing program 1: 18:12:11 executing program 4: 18:12:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfeffffff) 18:12:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7a000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1861.585508][ T4745] device bridge1380 entered promiscuous mode 18:12:12 executing program 1: 18:12:12 executing program 4: 18:12:12 executing program 3: [ 1861.636076][ T4748] device bridge1137 entered promiscuous mode [ 1861.712988][ T4749] device bridge_slave_0 left promiscuous mode [ 1861.767979][ T4749] bridge1379: port 1(bridge_slave_0) entered disabled state 18:12:12 executing program 3: 18:12:12 executing program 4: 18:12:12 executing program 1: [ 1861.896313][ T4749] bridge1380: port 1(bridge_slave_0) entered blocking state [ 1861.947471][ T4749] bridge1380: port 1(bridge_slave_0) entered disabled state [ 1861.968176][ T4749] device bridge_slave_0 entered promiscuous mode [ 1861.996687][ T4749] bridge1380: port 1(bridge_slave_0) entered blocking state [ 1862.004030][ T4749] bridge1380: port 1(bridge_slave_0) entered forwarding state [ 1862.097677][ T4752] device bridge_slave_0 left promiscuous mode [ 1862.111924][ T4752] bridge1136: port 1(bridge_slave_0) entered disabled state [ 1862.206163][ T4752] bridge1137: port 1(bridge_slave_0) entered blocking state [ 1862.235845][ T4752] bridge1137: port 1(bridge_slave_0) entered disabled state [ 1862.246063][ T4752] device bridge_slave_0 entered promiscuous mode [ 1862.256613][ T4752] bridge1137: port 1(bridge_slave_0) entered blocking state [ 1862.263944][ T4752] bridge1137: port 1(bridge_slave_0) entered forwarding state [ 1862.282332][ T4754] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1862.358219][ T4752] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:13 executing program 3: 18:12:13 executing program 1: 18:12:13 executing program 4: 18:12:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffa888) 18:12:13 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62548f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7acc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:13 executing program 4: 18:12:13 executing program 1: 18:12:13 executing program 3: [ 1862.640697][ T4781] device bridge1138 entered promiscuous mode [ 1862.739450][ T4783] device bridge1381 entered promiscuous mode 18:12:13 executing program 4: [ 1862.821044][ T4785] device bridge_slave_0 left promiscuous mode [ 1862.827330][ T4785] bridge1137: port 1(bridge_slave_0) entered disabled state 18:12:13 executing program 3: 18:12:13 executing program 4: 18:12:13 executing program 1: [ 1862.937986][ T4785] bridge1138: port 1(bridge_slave_0) entered blocking state [ 1863.006474][ T4785] bridge1138: port 1(bridge_slave_0) entered disabled state 18:12:13 executing program 3: [ 1863.054866][ T4785] device bridge_slave_0 entered promiscuous mode [ 1863.083419][ T4785] bridge1138: port 1(bridge_slave_0) entered blocking state [ 1863.090850][ T4785] bridge1138: port 1(bridge_slave_0) entered forwarding state 18:12:13 executing program 4: [ 1863.161533][ T4788] device bridge_slave_0 left promiscuous mode [ 1863.167787][ T4788] bridge1380: port 1(bridge_slave_0) entered disabled state [ 1863.263329][ T4788] bridge1381: port 1(bridge_slave_0) entered blocking state [ 1863.294505][ T4788] bridge1381: port 1(bridge_slave_0) entered disabled state [ 1863.337734][ T4788] device bridge_slave_0 entered promiscuous mode [ 1863.347393][ T4788] bridge1381: port 1(bridge_slave_0) entered blocking state [ 1863.354729][ T4788] bridge1381: port 1(bridge_slave_0) entered forwarding state [ 1863.392917][ T4789] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1863.526993][ T4785] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffff7f) 18:12:14 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a63a48f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:14 executing program 1: 18:12:14 executing program 4: 18:12:14 executing program 3: 18:12:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7bcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1863.765118][ T4825] device bridge1382 entered promiscuous mode 18:12:14 executing program 1: 18:12:14 executing program 3: 18:12:14 executing program 4: [ 1863.841618][ T4831] device bridge_slave_0 left promiscuous mode [ 1863.854039][ T4831] bridge1381: port 1(bridge_slave_0) entered disabled state 18:12:14 executing program 1: [ 1863.930920][ T4831] bridge1382: port 1(bridge_slave_0) entered blocking state [ 1863.987604][ T4831] bridge1382: port 1(bridge_slave_0) entered disabled state 18:12:14 executing program 4: [ 1864.042526][ T4831] device bridge_slave_0 entered promiscuous mode [ 1864.073371][ T4831] bridge1382: port 1(bridge_slave_0) entered blocking state [ 1864.080731][ T4831] bridge1382: port 1(bridge_slave_0) entered forwarding state 18:12:14 executing program 1: [ 1864.212863][ T4830] device bridge1139 entered promiscuous mode [ 1864.283965][ T4834] device bridge_slave_0 left promiscuous mode [ 1864.301969][ T4834] bridge1138: port 1(bridge_slave_0) entered disabled state [ 1864.385599][ T4834] bridge1139: port 1(bridge_slave_0) entered blocking state [ 1864.399339][ T4834] bridge1139: port 1(bridge_slave_0) entered disabled state [ 1864.407769][ T4834] device bridge_slave_0 entered promiscuous mode [ 1864.417228][ T4834] bridge1139: port 1(bridge_slave_0) entered blocking state [ 1864.424592][ T4834] bridge1139: port 1(bridge_slave_0) entered forwarding state [ 1864.477867][ T4836] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1864.586505][ T4836] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffff9e) 18:12:15 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a6c048f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:15 executing program 3: 18:12:15 executing program 4: 18:12:15 executing program 1: 18:12:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7ccc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:15 executing program 1: 18:12:15 executing program 4: 18:12:15 executing program 3: [ 1864.910923][ T4869] device bridge1383 entered promiscuous mode 18:12:15 executing program 4: 18:12:15 executing program 3: [ 1865.090607][ T4871] device bridge1140 entered promiscuous mode 18:12:15 executing program 1: [ 1865.151435][ T4872] device bridge_slave_0 left promiscuous mode [ 1865.168664][ T4872] bridge1382: port 1(bridge_slave_0) entered disabled state [ 1865.298975][ T4872] bridge1383: port 1(bridge_slave_0) entered blocking state [ 1865.308291][ T4872] bridge1383: port 1(bridge_slave_0) entered disabled state [ 1865.367019][ T4872] device bridge_slave_0 entered promiscuous mode [ 1865.379282][ T4872] bridge1383: port 1(bridge_slave_0) entered blocking state [ 1865.386585][ T4872] bridge1383: port 1(bridge_slave_0) entered forwarding state [ 1865.403885][ T4874] device bridge_slave_0 left promiscuous mode [ 1865.413532][ T4874] bridge1139: port 1(bridge_slave_0) entered disabled state [ 1865.475824][ T4874] bridge1140: port 1(bridge_slave_0) entered blocking state [ 1865.502125][ T4874] bridge1140: port 1(bridge_slave_0) entered disabled state [ 1865.515885][ T4874] device bridge_slave_0 entered promiscuous mode [ 1865.534092][ T4874] bridge1140: port 1(bridge_slave_0) entered blocking state [ 1865.541437][ T4874] bridge1140: port 1(bridge_slave_0) entered forwarding state [ 1865.562752][ T4882] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:16 executing program 4: [ 1865.636421][ T4874] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:16 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62425f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:16 executing program 3: 18:12:16 executing program 1: 18:12:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffffc3) 18:12:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7dcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:16 executing program 4: 18:12:16 executing program 1: [ 1865.937926][ T4904] device bridge1141 entered promiscuous mode 18:12:16 executing program 3: 18:12:16 executing program 4: [ 1866.069449][ T4905] device bridge1384 entered promiscuous mode 18:12:16 executing program 1: [ 1866.147400][ T4908] device bridge_slave_0 left promiscuous mode [ 1866.166854][ T4908] bridge1140: port 1(bridge_slave_0) entered disabled state 18:12:16 executing program 4: 18:12:16 executing program 3: [ 1866.251469][ T4908] bridge1141: port 1(bridge_slave_0) entered blocking state [ 1866.281177][ T4908] bridge1141: port 1(bridge_slave_0) entered disabled state [ 1866.301739][ T4908] device bridge_slave_0 entered promiscuous mode [ 1866.319442][ T4908] bridge1141: port 1(bridge_slave_0) entered blocking state [ 1866.326814][ T4908] bridge1141: port 1(bridge_slave_0) entered forwarding state [ 1866.396686][ T4911] device bridge_slave_0 left promiscuous mode [ 1866.411209][ T4911] bridge1383: port 1(bridge_slave_0) entered disabled state [ 1866.485919][ T4911] bridge1384: port 1(bridge_slave_0) entered blocking state [ 1866.495317][ T4911] bridge1384: port 1(bridge_slave_0) entered disabled state [ 1866.522182][ T4911] device bridge_slave_0 entered promiscuous mode [ 1866.540658][ T4911] bridge1384: port 1(bridge_slave_0) entered blocking state [ 1866.548049][ T4911] bridge1384: port 1(bridge_slave_0) entered forwarding state [ 1866.570082][ T4912] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1866.677252][ T4908] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:17 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a6245df61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:17 executing program 1: 18:12:17 executing program 4: 18:12:17 executing program 3: 18:12:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7ecc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfffffff0) 18:12:17 executing program 4: 18:12:17 executing program 3: 18:12:17 executing program 1: [ 1867.051982][ T4941] device bridge1142 entered promiscuous mode [ 1867.105047][ T4946] device bridge1385 entered promiscuous mode [ 1867.158468][ T4947] device bridge_slave_0 left promiscuous mode [ 1867.164851][ T4947] bridge1141: port 1(bridge_slave_0) entered disabled state 18:12:17 executing program 4: 18:12:17 executing program 1: [ 1867.263738][ T4947] bridge1142: port 1(bridge_slave_0) entered blocking state [ 1867.296817][ T4947] bridge1142: port 1(bridge_slave_0) entered disabled state 18:12:17 executing program 3: [ 1867.317290][ T4947] device bridge_slave_0 entered promiscuous mode [ 1867.334200][ T4947] bridge1142: port 1(bridge_slave_0) entered blocking state [ 1867.341540][ T4947] bridge1142: port 1(bridge_slave_0) entered forwarding state [ 1867.413724][ T4949] device bridge_slave_0 left promiscuous mode [ 1867.423009][ T4949] bridge1384: port 1(bridge_slave_0) entered disabled state [ 1867.511082][ T4949] bridge1385: port 1(bridge_slave_0) entered blocking state [ 1867.531620][ T4949] bridge1385: port 1(bridge_slave_0) entered disabled state [ 1867.546650][ T4949] device bridge_slave_0 entered promiscuous mode [ 1867.556259][ T4949] bridge1385: port 1(bridge_slave_0) entered blocking state [ 1867.563605][ T4949] bridge1385: port 1(bridge_slave_0) entered forwarding state [ 1867.583906][ T4941] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1867.704326][ T4947] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:18 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61edab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:18 executing program 1: 18:12:18 executing program 4: 18:12:18 executing program 3: 18:12:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7fcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfffffffc) 18:12:18 executing program 1: [ 1868.119798][ T4980] device bridge1386 entered promiscuous mode 18:12:18 executing program 3: 18:12:18 executing program 4: [ 1868.199137][ T4981] device bridge1143 entered promiscuous mode [ 1868.266278][ T4984] device bridge_slave_0 left promiscuous mode [ 1868.289387][ T4984] bridge1385: port 1(bridge_slave_0) entered disabled state 18:12:18 executing program 1: 18:12:18 executing program 4: 18:12:18 executing program 3: [ 1868.384406][ T4984] bridge1386: port 1(bridge_slave_0) entered blocking state [ 1868.448196][ T4984] bridge1386: port 1(bridge_slave_0) entered disabled state [ 1868.456298][ T4984] device bridge_slave_0 entered promiscuous mode [ 1868.547730][ T4984] bridge1386: port 1(bridge_slave_0) entered blocking state [ 1868.555077][ T4984] bridge1386: port 1(bridge_slave_0) entered forwarding state [ 1868.622753][ T4985] device bridge_slave_0 left promiscuous mode [ 1868.645671][ T4985] bridge1142: port 1(bridge_slave_0) entered disabled state [ 1868.708923][ T4985] bridge1143: port 1(bridge_slave_0) entered blocking state [ 1868.721047][ T4985] bridge1143: port 1(bridge_slave_0) entered disabled state [ 1868.751538][ T4985] device bridge_slave_0 entered promiscuous mode [ 1868.777749][ T4985] bridge1143: port 1(bridge_slave_0) entered blocking state [ 1868.785174][ T4985] bridge1143: port 1(bridge_slave_0) entered forwarding state [ 1868.820203][ T4987] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1868.876196][ T4980] device bridge_slave_0 left promiscuous mode [ 1868.890379][ T4980] bridge1386: port 1(bridge_slave_0) entered disabled state [ 1868.963408][ T4987] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:19 executing program 1: 18:12:19 executing program 4: 18:12:19 executing program 3: 18:12:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfffffffe) 18:12:19 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f63adab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x80cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:19 executing program 3: 18:12:19 executing program 4: 18:12:19 executing program 1: [ 1869.231648][ T5016] device bridge1387 entered promiscuous mode [ 1869.337178][ T5019] device bridge1144 entered promiscuous mode 18:12:19 executing program 3: [ 1869.410081][ T5020] bridge1387: port 1(bridge_slave_0) entered blocking state [ 1869.417427][ T5020] bridge1387: port 1(bridge_slave_0) entered disabled state 18:12:19 executing program 4: [ 1869.453646][ T5020] device bridge_slave_0 entered promiscuous mode [ 1869.491815][ T5020] bridge1387: port 1(bridge_slave_0) entered blocking state 18:12:19 executing program 1: [ 1869.499164][ T5020] bridge1387: port 1(bridge_slave_0) entered forwarding state [ 1869.545495][ T5022] device bridge_slave_0 left promiscuous mode [ 1869.560355][ T5022] bridge1143: port 1(bridge_slave_0) entered disabled state 18:12:20 executing program 1: 18:12:20 executing program 3: [ 1869.637398][ T5022] bridge1144: port 1(bridge_slave_0) entered blocking state [ 1869.652545][ T5022] bridge1144: port 1(bridge_slave_0) entered disabled state [ 1869.677706][ T5022] device bridge_slave_0 entered promiscuous mode [ 1869.711076][ T5022] bridge1144: port 1(bridge_slave_0) entered blocking state [ 1869.718436][ T5022] bridge1144: port 1(bridge_slave_0) entered forwarding state 18:12:20 executing program 4: [ 1869.784212][ T5027] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1869.953321][ T5027] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x100000000000000) 18:12:20 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab202e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:20 executing program 3: 18:12:20 executing program 1: 18:12:20 executing program 4: 18:12:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x81000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1870.199953][ T5054] device bridge1388 entered promiscuous mode [ 1870.232704][ T5057] device bridge_slave_0 left promiscuous mode [ 1870.239116][ T5057] bridge1387: port 1(bridge_slave_0) entered disabled state [ 1870.296948][ T5057] bridge1388: port 1(bridge_slave_0) entered blocking state [ 1870.321791][ T5057] bridge1388: port 1(bridge_slave_0) entered disabled state 18:12:20 executing program 3: [ 1870.361987][ T5057] device bridge_slave_0 entered promiscuous mode [ 1870.376058][ T5057] bridge1388: port 1(bridge_slave_0) entered blocking state [ 1870.383489][ T5057] bridge1388: port 1(bridge_slave_0) entered forwarding state 18:12:20 executing program 4: 18:12:20 executing program 1: [ 1870.455195][ T5064] device bridge1145 entered promiscuous mode [ 1870.507158][ T5062] device bridge1388 left promiscuous mode [ 1870.535795][ T5067] device bridge_slave_0 left promiscuous mode [ 1870.550876][ T5067] bridge1144: port 1(bridge_slave_0) entered disabled state [ 1870.599065][ T5067] bridge1145: port 1(bridge_slave_0) entered blocking state [ 1870.607496][ T5067] bridge1145: port 1(bridge_slave_0) entered disabled state [ 1870.628808][ T5067] device bridge_slave_0 entered promiscuous mode 18:12:21 executing program 4: 18:12:21 executing program 1: 18:12:21 executing program 3: [ 1870.644252][ T5067] bridge1145: port 1(bridge_slave_0) entered blocking state [ 1870.651578][ T5067] bridge1145: port 1(bridge_slave_0) entered forwarding state [ 1870.701943][ T5068] validate_nla: 1 callbacks suppressed [ 1870.701956][ T5068] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1870.767253][ T5057] device bridge1388 entered promiscuous mode [ 1870.822953][ T5076] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1870.851626][ T5076] device bridge1388 left promiscuous mode [ 1870.897380][ T5068] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x200000000000000) [ 1871.173174][ T5090] device bridge1389 entered promiscuous mode [ 1871.199476][ T5093] device bridge_slave_0 left promiscuous mode [ 1871.206628][ T5093] bridge1388: port 1(bridge_slave_0) entered disabled state [ 1871.256762][ T5093] bridge1389: port 1(bridge_slave_0) entered blocking state [ 1871.267673][ T5093] bridge1389: port 1(bridge_slave_0) entered disabled state [ 1871.276565][ T5093] device bridge_slave_0 entered promiscuous mode [ 1871.289107][ T5093] bridge1389: port 1(bridge_slave_0) entered blocking state [ 1871.296464][ T5093] bridge1389: port 1(bridge_slave_0) entered forwarding state 18:12:21 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab203e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:21 executing program 3: 18:12:21 executing program 1: 18:12:21 executing program 4: 18:12:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x81cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1871.367584][ T5090] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1871.397847][ T5090] device bridge1389 left promiscuous mode 18:12:22 executing program 4: 18:12:22 executing program 1: 18:12:22 executing program 3: [ 1871.526603][ T5100] device bridge1146 entered promiscuous mode [ 1871.601516][ T5094] device bridge1389 entered promiscuous mode [ 1871.662210][ T5104] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:12:22 executing program 1: 18:12:22 executing program 4: [ 1871.708220][ T5104] device bridge1389 left promiscuous mode [ 1871.731787][ T5103] device bridge_slave_0 left promiscuous mode [ 1871.750644][ T5103] bridge1145: port 1(bridge_slave_0) entered disabled state 18:12:22 executing program 3: 18:12:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x300000000000000) [ 1871.835722][ T5103] bridge1146: port 1(bridge_slave_0) entered blocking state [ 1871.951040][ T5103] bridge1146: port 1(bridge_slave_0) entered disabled state [ 1872.005029][ T5103] device bridge_slave_0 entered promiscuous mode [ 1872.050889][ T5103] bridge1146: port 1(bridge_slave_0) entered blocking state [ 1872.058229][ T5103] bridge1146: port 1(bridge_slave_0) entered forwarding state [ 1872.131872][ T5106] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1872.259095][ T5122] device bridge1390 entered promiscuous mode [ 1872.279459][ T5124] device bridge_slave_0 left promiscuous mode [ 1872.287064][ T5124] bridge1389: port 1(bridge_slave_0) entered disabled state [ 1872.346523][ T5124] bridge1390: port 1(bridge_slave_0) entered blocking state [ 1872.357112][ T5124] bridge1390: port 1(bridge_slave_0) entered disabled state [ 1872.365662][ T5124] device bridge_slave_0 entered promiscuous mode [ 1872.378930][ T5124] bridge1390: port 1(bridge_slave_0) entered blocking state [ 1872.386274][ T5124] bridge1390: port 1(bridge_slave_0) entered forwarding state [ 1872.419374][ T5129] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1872.427578][ T5129] device bridge1390 left promiscuous mode [ 1872.441742][ T5103] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1872.482532][ T5122] device bridge1390 entered promiscuous mode [ 1872.509291][ T5129] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1872.528685][ T5129] device bridge1390 left promiscuous mode 18:12:23 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab204e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:23 executing program 3: 18:12:23 executing program 4: 18:12:23 executing program 1: 18:12:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x82cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x400000000000000) 18:12:23 executing program 4: 18:12:23 executing program 3: 18:12:23 executing program 1: [ 1872.784011][ T5142] device bridge1147 entered promiscuous mode [ 1872.847595][ T5145] device bridge1391 entered promiscuous mode [ 1872.917778][ T5146] device bridge_slave_0 left promiscuous mode [ 1872.927932][ T5146] bridge1146: port 1(bridge_slave_0) entered disabled state 18:12:23 executing program 4: 18:12:23 executing program 1: [ 1873.047896][ T5146] bridge1147: port 1(bridge_slave_0) entered blocking state [ 1873.060603][ T5146] bridge1147: port 1(bridge_slave_0) entered disabled state [ 1873.083344][ T5146] device bridge_slave_0 entered promiscuous mode [ 1873.097167][ T5146] bridge1147: port 1(bridge_slave_0) entered blocking state [ 1873.104530][ T5146] bridge1147: port 1(bridge_slave_0) entered forwarding state [ 1873.138152][ T5148] device bridge_slave_0 left promiscuous mode 18:12:23 executing program 3: [ 1873.148188][ T5148] bridge1390: port 1(bridge_slave_0) entered disabled state [ 1873.238930][ T5148] bridge1391: port 1(bridge_slave_0) entered blocking state [ 1873.246342][ T5148] bridge1391: port 1(bridge_slave_0) entered disabled state [ 1873.287259][ T5148] device bridge_slave_0 entered promiscuous mode [ 1873.312438][ T5148] bridge1391: port 1(bridge_slave_0) entered blocking state [ 1873.319790][ T5148] bridge1391: port 1(bridge_slave_0) entered forwarding state [ 1873.359361][ T5149] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1873.393153][ T5145] device bridge1391 left promiscuous mode [ 1873.505211][ T5148] device bridge1391 entered promiscuous mode [ 1873.547084][ T5169] device bridge1391 left promiscuous mode 18:12:24 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab205e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x83cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x500000000000000) 18:12:24 executing program 1: 18:12:24 executing program 4: 18:12:24 executing program 3: 18:12:24 executing program 3: 18:12:24 executing program 1: 18:12:24 executing program 4: [ 1873.862235][ T5179] device bridge1149 entered promiscuous mode [ 1873.934327][ T5181] device bridge1392 entered promiscuous mode 18:12:24 executing program 1: 18:12:24 executing program 3: [ 1874.027943][ T5183] device bridge_slave_0 left promiscuous mode [ 1874.047170][ T5183] bridge1147: port 1(bridge_slave_0) entered disabled state 18:12:24 executing program 4: [ 1874.126359][ T5183] bridge1149: port 1(bridge_slave_0) entered blocking state [ 1874.143974][ T5183] bridge1149: port 1(bridge_slave_0) entered disabled state [ 1874.163246][ T5183] device bridge_slave_0 entered promiscuous mode [ 1874.221189][ T5183] bridge1149: port 1(bridge_slave_0) entered blocking state [ 1874.228581][ T5183] bridge1149: port 1(bridge_slave_0) entered forwarding state [ 1874.297762][ T5184] device bridge_slave_0 left promiscuous mode [ 1874.312550][ T5184] bridge1391: port 1(bridge_slave_0) entered disabled state [ 1874.366469][ T5184] bridge1392: port 1(bridge_slave_0) entered blocking state [ 1874.378443][ T5184] bridge1392: port 1(bridge_slave_0) entered disabled state [ 1874.387717][ T5184] device bridge_slave_0 entered promiscuous mode [ 1874.412988][ T5184] bridge1392: port 1(bridge_slave_0) entered blocking state [ 1874.420336][ T5184] bridge1392: port 1(bridge_slave_0) entered forwarding state [ 1874.533434][ T5188] device bridge1392 left promiscuous mode [ 1874.575932][ T5181] device bridge1392 entered promiscuous mode [ 1874.610279][ T5188] device bridge1392 left promiscuous mode 18:12:25 executing program 1: 18:12:25 executing program 3: 18:12:25 executing program 4: 18:12:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x84cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:25 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab206e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x600000000000000) 18:12:25 executing program 3: [ 1874.945807][ T5216] device bridge1393 entered promiscuous mode 18:12:25 executing program 1: 18:12:25 executing program 4: 18:12:25 executing program 3: [ 1875.055962][ T5217] device bridge1150 entered promiscuous mode [ 1875.111918][ T5220] device bridge_slave_0 left promiscuous mode [ 1875.122032][ T5220] bridge1392: port 1(bridge_slave_0) entered disabled state 18:12:25 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='J'], 0x1) 18:12:25 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x20200, 0x0) [ 1875.194398][ T5220] bridge1393: port 1(bridge_slave_0) entered blocking state [ 1875.208192][ T5220] bridge1393: port 1(bridge_slave_0) entered disabled state [ 1875.216304][ T5220] device bridge_slave_0 entered promiscuous mode 18:12:25 executing program 3: socket$kcm(0xa, 0x802, 0x88) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) [ 1875.312632][ T5220] bridge1393: port 1(bridge_slave_0) entered blocking state [ 1875.320096][ T5220] bridge1393: port 1(bridge_slave_0) entered forwarding state [ 1875.418200][ T5221] device bridge_slave_0 left promiscuous mode [ 1875.427836][ T5221] bridge1149: port 1(bridge_slave_0) entered disabled state [ 1875.496481][ T5221] bridge1150: port 1(bridge_slave_0) entered blocking state [ 1875.517958][ T5221] bridge1150: port 1(bridge_slave_0) entered disabled state [ 1875.526853][ T5221] device bridge_slave_0 entered promiscuous mode [ 1875.539487][ T5221] bridge1150: port 1(bridge_slave_0) entered blocking state 18:12:26 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) [ 1875.546822][ T5221] bridge1150: port 1(bridge_slave_0) entered forwarding state [ 1875.595522][ T5216] device bridge1393 left promiscuous mode 18:12:26 executing program 1: [ 1875.696978][ T5226] device bridge1393 entered promiscuous mode 18:12:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x85000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1875.759114][ T5349] validate_nla: 10 callbacks suppressed [ 1875.759126][ T5349] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1875.790747][ T5349] device bridge1393 left promiscuous mode [ 1876.018826][ T5357] device bridge1151 entered promiscuous mode 18:12:26 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab207e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:26 executing program 4: 18:12:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000002c0)=""/239, 0xef}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00919) shutdown(r0, 0x0) shutdown(r1, 0x0) 18:12:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x80, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x4}]}, 0x80}}, 0x0) 18:12:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x700000000000000) [ 1876.066985][ T5359] device bridge_slave_0 left promiscuous mode [ 1876.096342][ T5359] bridge1150: port 1(bridge_slave_0) entered disabled state 18:12:26 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 18:12:26 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0xeffd) [ 1876.227351][ T5359] bridge1151: port 1(bridge_slave_0) entered blocking state [ 1876.235846][ T5359] bridge1151: port 1(bridge_slave_0) entered disabled state [ 1876.279413][ T5359] device bridge_slave_0 entered promiscuous mode [ 1876.303738][ T5359] bridge1151: port 1(bridge_slave_0) entered blocking state [ 1876.311128][ T5359] bridge1151: port 1(bridge_slave_0) entered forwarding state 18:12:26 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='J\x00'], 0x2) [ 1876.386274][ T5362] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1876.494560][ T5371] device bridge1394 entered promiscuous mode 18:12:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0xeffd) [ 1876.566925][ T5435] device bridge_slave_0 left promiscuous mode [ 1876.575667][ T5435] bridge1393: port 1(bridge_slave_0) entered disabled state [ 1876.615693][ T5435] bridge1394: port 1(bridge_slave_0) entered blocking state [ 1876.668216][ T5435] bridge1394: port 1(bridge_slave_0) entered disabled state [ 1876.676266][ T5435] device bridge_slave_0 entered promiscuous mode [ 1876.713482][ T5435] bridge1394: port 1(bridge_slave_0) entered blocking state [ 1876.720874][ T5435] bridge1394: port 1(bridge_slave_0) entered forwarding state [ 1876.744718][ T5480] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1876.757251][ T5480] device bridge1394 left promiscuous mode [ 1876.793141][ T5362] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x5451, 0x0) 18:12:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x85cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1876.898126][ T5435] device bridge1394 entered promiscuous mode [ 1876.934380][ T5480] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:12:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) [ 1876.981172][ T5480] device bridge1394 left promiscuous mode [ 1877.116678][ T5698] device bridge1152 entered promiscuous mode 18:12:27 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab208e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:27 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, 0x0) 18:12:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xa00000000000000) 18:12:27 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r0) r2 = socket$unix(0x1, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getpeername$unix(r3, 0x0, &(0x7f0000000180)) [ 1877.218770][ T5701] device bridge_slave_0 left promiscuous mode [ 1877.304818][ T5701] bridge1151: port 1(bridge_slave_0) entered disabled state 18:12:27 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r0, r2, 0x0) getsockname(r2, 0x0, &(0x7f0000000340)) 18:12:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x50, 0x0, 0x1, 0x519, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x21, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x0, 0x1, @ipv4={{}, {0x0, 0x2, @dev}}}, @CTA_TUPLE_ZONE]}]}, 0x50}}, 0x0) [ 1877.415689][ T5701] bridge1152: port 1(bridge_slave_0) entered blocking state [ 1877.429301][ T5701] bridge1152: port 1(bridge_slave_0) entered disabled state [ 1877.444646][ T5701] device bridge_slave_0 entered promiscuous mode [ 1877.472557][ T5701] bridge1152: port 1(bridge_slave_0) entered blocking state [ 1877.479897][ T5701] bridge1152: port 1(bridge_slave_0) entered forwarding state 18:12:28 executing program 3: r0 = socket(0xa, 0x80801, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, 0x0, &(0x7f0000000000)) [ 1877.578039][ T5703] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1877.587801][ T5925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1877.610444][ T5925] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1877.656467][ T5925] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1877.695060][ T5762] device bridge1395 entered promiscuous mode 18:12:28 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') close(r0) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000002c0)) [ 1877.727826][ T5816] device bridge_slave_0 left promiscuous mode 18:12:28 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = dup2(r1, r1) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 1877.768392][ T5816] bridge1394: port 1(bridge_slave_0) entered disabled state 18:12:28 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = dup2(r1, r1) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xffffffa9}}, 0x0) close(r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) socket$unix(0x1, 0x20000000001, 0x0) tkill(r0, 0x1000000000016) [ 1877.836559][ T5816] bridge1395: port 1(bridge_slave_0) entered blocking state [ 1877.855720][ T5816] bridge1395: port 1(bridge_slave_0) entered disabled state [ 1877.875597][ T5816] device bridge_slave_0 entered promiscuous mode [ 1877.891476][ T5816] bridge1395: port 1(bridge_slave_0) entered blocking state [ 1877.898856][ T5816] bridge1395: port 1(bridge_slave_0) entered forwarding state [ 1877.957507][ T5889] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1877.973988][ T5889] device bridge1395 left promiscuous mode [ 1878.027364][ T5703] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1878.177163][ T5889] device bridge1395 entered promiscuous mode [ 1878.203390][ T5818] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:12:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x86cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:28 executing program 4: r0 = creat(&(0x7f0000000a00)='./file0\x00', 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000b80)) [ 1878.229250][ T5818] device bridge1395 left promiscuous mode 18:12:28 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab209e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000100)=0x4fb, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=@can={0x1d, r4}, 0x80) 18:12:28 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$unix(r1, 0x0, 0x0) ioctl$SIOCGSTAMP(r2, 0x8904, &(0x7f00000001c0)) 18:12:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xc00000000000000) 18:12:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = ioctl$TIOCGPTPEER(r2, 0x5414, 0x20000004) ioctl$TIOCGPTPEER(r3, 0x5414, 0x20000004) [ 1878.450117][ T6252] device bridge1153 entered promiscuous mode [ 1878.533894][ T6254] device bridge_slave_0 left promiscuous mode [ 1878.578289][ T6254] bridge1152: port 1(bridge_slave_0) entered disabled state 18:12:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5414, 0x20000005) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 18:12:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0x5450, 0x0) [ 1878.639848][ T6254] bridge1153: port 1(bridge_slave_0) entered blocking state [ 1878.678163][ T6254] bridge1153: port 1(bridge_slave_0) entered disabled state 18:12:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5414, 0x20000004) flock(r1, 0x8) [ 1878.703701][ T6254] device bridge_slave_0 entered promiscuous mode [ 1878.749745][ T6254] bridge1153: port 1(bridge_slave_0) entered blocking state [ 1878.757080][ T6254] bridge1153: port 1(bridge_slave_0) entered forwarding state 18:12:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) getpeername$unix(r3, 0x0, &(0x7f0000000080)) 18:12:29 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x21) [ 1878.921284][ T6258] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1879.014841][ T6261] device bridge1396 entered promiscuous mode [ 1879.101739][ T6385] device bridge_slave_0 left promiscuous mode [ 1879.124035][ T6385] bridge1395: port 1(bridge_slave_0) entered disabled state [ 1879.205595][ T6385] bridge1396: port 1(bridge_slave_0) entered blocking state [ 1879.247895][ T6385] bridge1396: port 1(bridge_slave_0) entered disabled state [ 1879.279392][ T6385] device bridge_slave_0 entered promiscuous mode [ 1879.299994][ T6385] bridge1396: port 1(bridge_slave_0) entered blocking state [ 1879.307417][ T6385] bridge1396: port 1(bridge_slave_0) entered forwarding state [ 1879.334528][ T6471] device bridge1396 left promiscuous mode 18:12:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x87cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:29 executing program 3: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="01634040"], 0x1, 0x0, &(0x7f0000000080)="be"}) [ 1879.394122][ T6261] device bridge1396 entered promiscuous mode [ 1879.450101][ T6796] debugfs: File '6795' in directory 'proc' already present! [ 1879.462487][ T6471] device bridge1396 left promiscuous mode [ 1879.494607][ T6796] debugfs: File '6795' in directory 'proc' already present! [ 1879.562416][ T6808] device bridge1154 entered promiscuous mode [ 1879.614432][ T6901] device bridge_slave_0 left promiscuous mode 18:12:30 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20be2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:30 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$setstatus(r0, 0x4, 0x3800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = dup(r1) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x6}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000000)={0x962, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x2, 0x0, 0x1, 0x1f, 0x0, 0x5, "75457881"}, 0x494, 0x0, @offset=0x1, 0xce}) 18:12:30 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/unix\x00') 18:12:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xe00000000000000) 18:12:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)=@chain={'key_or_keyring:', r1, ':chain\x00'}) [ 1879.660734][ T6901] bridge1153: port 1(bridge_slave_0) entered disabled state [ 1879.791964][ T6901] bridge1154: port 1(bridge_slave_0) entered blocking state [ 1879.812505][ T6901] bridge1154: port 1(bridge_slave_0) entered disabled state 18:12:30 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1df, 0x4000) 18:12:30 executing program 1: syz_emit_ethernet(0x3b6, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYBLOB="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"], 0x0) [ 1879.850030][ T6901] device bridge_slave_0 entered promiscuous mode [ 1879.865824][ T6901] bridge1154: port 1(bridge_slave_0) entered blocking state [ 1879.873190][ T6901] bridge1154: port 1(bridge_slave_0) entered forwarding state [ 1879.986638][ T6910] device bridge1397 entered promiscuous mode [ 1880.016112][ T7015] device bridge_slave_0 left promiscuous mode [ 1880.035779][ T7015] bridge1396: port 1(bridge_slave_0) entered disabled state [ 1880.068131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1880.073923][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:12:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3c) [ 1880.091469][ T7015] bridge1397: port 1(bridge_slave_0) entered blocking state [ 1880.101885][ T7015] bridge1397: port 1(bridge_slave_0) entered disabled state [ 1880.110287][ T7015] device bridge_slave_0 entered promiscuous mode [ 1880.129795][ T7015] bridge1397: port 1(bridge_slave_0) entered blocking state [ 1880.137127][ T7015] bridge1397: port 1(bridge_slave_0) entered forwarding state [ 1880.172311][ T7019] device bridge1397 left promiscuous mode 18:12:30 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1df, 0x4000) [ 1880.232235][ T7015] device bridge1397 entered promiscuous mode 18:12:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1880.289761][ T6910] device bridge_slave_0 left promiscuous mode [ 1880.296254][ T6910] bridge1397: port 1(bridge_slave_0) entered disabled state [ 1880.388734][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1880.394499][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:12:30 executing program 1: getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 18:12:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xf00000000000000) [ 1880.555413][ T7240] device bridge1155 entered promiscuous mode [ 1880.786084][ T7249] device bridge1399 entered promiscuous mode 18:12:31 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20fe2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:31 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=n']) 18:12:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x268, 0x0, 0x268, 0x268, 0x268, 0x460, 0x460, 0x460, 0x460, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x268, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_virt_wifi\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x6, 0x0, 'snmp_trap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) [ 1880.847902][ T7242] device bridge_slave_0 left promiscuous mode [ 1880.860085][ T7242] bridge1154: port 1(bridge_slave_0) entered disabled state [ 1880.906098][ T7242] bridge1155: port 1(bridge_slave_0) entered blocking state [ 1880.925466][ T7242] bridge1155: port 1(bridge_slave_0) entered disabled state [ 1880.934081][ T7242] device bridge_slave_0 entered promiscuous mode [ 1880.943433][ T7242] bridge1155: port 1(bridge_slave_0) entered blocking state 18:12:31 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1880.950839][ T7242] bridge1155: port 1(bridge_slave_0) entered forwarding state [ 1880.980306][ T7356] 9p: Unknown Cache mode n [ 1881.017819][ T7357] xt_CT: No such helper "snmp_trap" [ 1881.040319][ T7244] validate_nla: 7 callbacks suppressed [ 1881.040329][ T7244] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1881.044564][ T7362] 9p: Unknown Cache mode n [ 1881.067053][ T7251] bridge1399: port 1(bridge_slave_0) entered blocking state 18:12:31 executing program 3: [ 1881.087868][ T7251] bridge1399: port 1(bridge_slave_0) entered disabled state [ 1881.105645][ T7251] device bridge_slave_0 entered promiscuous mode [ 1881.122802][ T7251] bridge1399: port 1(bridge_slave_0) entered blocking state [ 1881.130134][ T7251] bridge1399: port 1(bridge_slave_0) entered forwarding state 18:12:31 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) 18:12:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1881.228371][ T7249] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1881.252004][ T7249] device bridge1399 left promiscuous mode 18:12:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_adj\x00') write$P9_RLERROR(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT], 0x17) [ 1881.343751][ T7244] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1881.371096][ T7251] device bridge1399 entered promiscuous mode 18:12:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x88cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1881.402665][ T7474] IPVS: stopping backup sync thread 7476 ... [ 1881.404196][ T7252] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1881.410311][ T7476] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 1881.430703][ T7252] device bridge1399 left promiscuous mode 18:12:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x1000000000000000) 18:12:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ptrace(0x11, r0) 18:12:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4009012, r3, 0x0) [ 1881.694281][ T7582] device bridge1156 entered promiscuous mode [ 1881.780987][ T7585] device bridge_slave_0 left promiscuous mode [ 1881.787343][ T7585] bridge1155: port 1(bridge_slave_0) entered disabled state [ 1881.845935][ T7585] bridge1156: port 1(bridge_slave_0) entered blocking state [ 1881.879371][ T7585] bridge1156: port 1(bridge_slave_0) entered disabled state [ 1881.908940][ T7585] device bridge_slave_0 entered promiscuous mode [ 1881.925680][ T7585] bridge1156: port 1(bridge_slave_0) entered blocking state [ 1881.933059][ T7585] bridge1156: port 1(bridge_slave_0) entered forwarding state [ 1881.963607][ T7593] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1882.033199][ T7597] device bridge1400 entered promiscuous mode [ 1882.080987][ T7599] device bridge_slave_0 left promiscuous mode [ 1882.087366][ T7599] bridge1399: port 1(bridge_slave_0) entered disabled state [ 1882.165099][ T7599] bridge1400: port 1(bridge_slave_0) entered blocking state [ 1882.172540][ T7599] bridge1400: port 1(bridge_slave_0) entered disabled state [ 1882.181025][ T7599] device bridge_slave_0 entered promiscuous mode [ 1882.188790][ T7599] bridge1400: port 1(bridge_slave_0) entered blocking state [ 1882.196098][ T7599] bridge1400: port 1(bridge_slave_0) entered forwarding state 18:12:32 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab210e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:32 executing program 3: [ 1882.221607][ T7705] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1882.230440][ T7705] device bridge1400 left promiscuous mode [ 1882.246809][ T7599] device bridge1400 entered promiscuous mode [ 1882.273965][ T7593] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:32 executing program 3: [ 1882.353392][ T7704] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1882.385952][ T7704] device bridge1400 left promiscuous mode 18:12:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x89cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x2000000000000000) 18:12:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:33 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ptrace(0x11, r0) 18:12:33 executing program 3: [ 1882.703381][ T7830] device bridge1158 entered promiscuous mode [ 1882.794279][ T7850] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1882.860300][ T7839] device bridge1401 entered promiscuous mode 18:12:33 executing program 3: [ 1882.927960][ T7840] device bridge_slave_0 left promiscuous mode [ 1882.937277][ T7840] bridge1156: port 1(bridge_slave_0) entered disabled state 18:12:33 executing program 3: [ 1883.020428][ T7840] bridge1158: port 1(bridge_slave_0) entered blocking state [ 1883.044072][ T7840] bridge1158: port 1(bridge_slave_0) entered disabled state [ 1883.059905][ T7840] device bridge_slave_0 entered promiscuous mode [ 1883.075328][ T7840] bridge1158: port 1(bridge_slave_0) entered blocking state [ 1883.082740][ T7840] bridge1158: port 1(bridge_slave_0) entered forwarding state 18:12:33 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab225e2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1883.139893][ T7841] device bridge_slave_0 left promiscuous mode [ 1883.147251][ T7841] bridge1400: port 1(bridge_slave_0) entered disabled state 18:12:33 executing program 3: [ 1883.230130][ T7841] bridge1401: port 1(bridge_slave_0) entered blocking state [ 1883.248732][ T7841] bridge1401: port 1(bridge_slave_0) entered disabled state 18:12:33 executing program 3: [ 1883.283181][ T7841] device bridge_slave_0 entered promiscuous mode [ 1883.310516][ T7841] bridge1401: port 1(bridge_slave_0) entered blocking state [ 1883.317997][ T7841] bridge1401: port 1(bridge_slave_0) entered forwarding state [ 1883.358160][ T7844] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1883.405896][ T7845] device bridge1401 left promiscuous mode 18:12:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:33 executing program 3: 18:12:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8acc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x4000000000000000) 18:12:34 executing program 4: [ 1883.661917][ T7992] IPVS: stopping backup sync thread 7993 ... [ 1883.668002][ T7993] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 18:12:34 executing program 3: 18:12:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1883.842583][ T8000] device bridge1160 entered promiscuous mode [ 1883.871983][ T8003] device bridge_slave_0 left promiscuous mode 18:12:34 executing program 4: [ 1883.895752][ T8003] bridge1158: port 1(bridge_slave_0) entered disabled state [ 1883.993924][ T8003] bridge1160: port 1(bridge_slave_0) entered blocking state [ 1884.048162][ T8003] bridge1160: port 1(bridge_slave_0) entered disabled state [ 1884.068849][ T8003] device bridge_slave_0 entered promiscuous mode [ 1884.088564][ T8003] bridge1160: port 1(bridge_slave_0) entered blocking state 18:12:34 executing program 3: [ 1884.095884][ T8003] bridge1160: port 1(bridge_slave_0) entered forwarding state [ 1884.241036][ T8002] device bridge1402 entered promiscuous mode [ 1884.270564][ T8005] device bridge_slave_0 left promiscuous mode [ 1884.277210][ T8005] bridge1401: port 1(bridge_slave_0) entered disabled state [ 1884.326956][ T8005] bridge1402: port 1(bridge_slave_0) entered blocking state [ 1884.334433][ T8005] bridge1402: port 1(bridge_slave_0) entered disabled state [ 1884.342611][ T8005] device bridge_slave_0 entered promiscuous mode [ 1884.349920][ T8005] bridge1402: port 1(bridge_slave_0) entered blocking state [ 1884.357242][ T8005] bridge1402: port 1(bridge_slave_0) entered forwarding state [ 1884.381307][ T8014] device bridge1402 left promiscuous mode [ 1884.396522][ T8005] device bridge1402 entered promiscuous mode [ 1884.425552][ T8009] device bridge1402 left promiscuous mode 18:12:34 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab23ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:34 executing program 4: 18:12:34 executing program 3: 18:12:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8bcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x4800000000000000) 18:12:35 executing program 3: 18:12:35 executing program 4: [ 1884.652550][ T8132] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 18:12:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:35 executing program 3: [ 1884.809799][ T8138] device bridge1161 entered promiscuous mode [ 1884.875474][ T8147] device bridge_slave_0 left promiscuous mode 18:12:35 executing program 4: [ 1884.919538][ T8147] bridge1402: port 1(bridge_slave_0) entered disabled state 18:12:35 executing program 3: [ 1885.026976][ T8141] device bridge_slave_0 left promiscuous mode [ 1885.035636][ T8141] bridge1160: port 1(bridge_slave_0) entered disabled state [ 1885.096274][ T8141] bridge1161: port 1(bridge_slave_0) entered blocking state [ 1885.110709][ T8141] bridge1161: port 1(bridge_slave_0) entered disabled state [ 1885.146489][ T8141] device bridge_slave_0 entered promiscuous mode [ 1885.179607][ T8141] bridge1161: port 1(bridge_slave_0) entered blocking state [ 1885.186933][ T8141] bridge1161: port 1(bridge_slave_0) entered forwarding state [ 1885.236901][ T8142] device bridge1403 entered promiscuous mode [ 1885.303803][ T8171] device bridge1403 left promiscuous mode [ 1885.392874][ T8142] device bridge1403 entered promiscuous mode [ 1885.428501][ T8151] device bridge1403 left promiscuous mode 18:12:36 executing program 4: 18:12:36 executing program 3: 18:12:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8ccc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:36 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae25595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x4c00000000000000) 18:12:36 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x50, 0x30, 0x53b, 0x0, 0x0, {}, [{0x3c, 0x1, @m_skbedit={0x38, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x4}}}}]}, 0x50}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1885.743021][ T8273] IPVS: stopping backup sync thread 8132 ... 18:12:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1885.796127][ T8275] device bridge1404 entered promiscuous mode [ 1885.844839][ T8274] device bridge1162 entered promiscuous mode [ 1885.920604][ T8285] device bridge1404 left promiscuous mode [ 1885.951961][ T8277] device bridge_slave_0 left promiscuous mode 18:12:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1885.965961][ T8277] bridge1161: port 1(bridge_slave_0) entered disabled state [ 1886.049180][ T8277] bridge1162: port 1(bridge_slave_0) entered blocking state [ 1886.074286][ T8277] bridge1162: port 1(bridge_slave_0) entered disabled state 18:12:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1886.105379][ T8277] device bridge_slave_0 entered promiscuous mode [ 1886.145339][ T8277] bridge1162: port 1(bridge_slave_0) entered blocking state 18:12:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1886.152687][ T8277] bridge1162: port 1(bridge_slave_0) entered forwarding state [ 1886.184279][ T8278] bridge1404: port 1(bridge_slave_0) entered blocking state [ 1886.193538][ T8278] bridge1404: port 1(bridge_slave_0) entered disabled state [ 1886.202443][ T8278] device bridge_slave_0 entered promiscuous mode [ 1886.265023][ T8399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1886.282449][ T8278] bridge1404: port 1(bridge_slave_0) entered blocking state [ 1886.289859][ T8278] bridge1404: port 1(bridge_slave_0) entered forwarding state 18:12:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1886.355224][ T8282] validate_nla: 11 callbacks suppressed [ 1886.355243][ T8282] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1886.399446][ T8285] device bridge1404 entered promiscuous mode [ 1886.463414][ T8275] netlink: 'syz-executor.0': attribute type 25 has an invalid length. 18:12:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1886.542541][ T8408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1886.567803][ T8277] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6000000000000000) 18:12:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8dcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:37 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae5d595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1886.820439][ T8416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 18:12:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="44010000100021060000000000000000ac141400000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x144}}, 0x0) 18:12:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1887.002296][ T8421] device bridge1163 entered promiscuous mode [ 1887.032898][ T8433] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 18:12:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1887.142444][ T8439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1887.144214][ T8423] device bridge1406 entered promiscuous mode 18:12:37 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1887.264233][ T8426] device bridge_slave_0 left promiscuous mode [ 1887.278367][ T8426] bridge1162: port 1(bridge_slave_0) entered disabled state [ 1887.336108][ T8426] bridge1163: port 1(bridge_slave_0) entered blocking state [ 1887.396840][ T8426] bridge1163: port 1(bridge_slave_0) entered disabled state [ 1887.417827][ T8426] device bridge_slave_0 entered promiscuous mode 18:12:37 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1887.456465][ T8426] bridge1163: port 1(bridge_slave_0) entered blocking state [ 1887.463827][ T8426] bridge1163: port 1(bridge_slave_0) entered forwarding state [ 1887.484703][ T8427] device bridge_slave_0 left promiscuous mode 18:12:37 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1887.506652][ T8427] bridge1404: port 1(bridge_slave_0) entered disabled state [ 1887.576943][ T8427] bridge1406: port 1(bridge_slave_0) entered blocking state [ 1887.603016][ T8427] bridge1406: port 1(bridge_slave_0) entered disabled state [ 1887.631495][ T8427] device bridge_slave_0 entered promiscuous mode [ 1887.657781][ T8427] bridge1406: port 1(bridge_slave_0) entered blocking state [ 1887.665143][ T8427] bridge1406: port 1(bridge_slave_0) entered forwarding state [ 1887.709298][ T8426] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1887.763258][ T8437] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1887.814895][ T8437] device bridge1406 left promiscuous mode [ 1887.864216][ T8434] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1887.897872][ T8444] device bridge84 entered promiscuous mode [ 1887.932074][ T8446] device bridge_slave_0 left promiscuous mode [ 1887.941828][ T8446] bridge83: port 1(bridge_slave_0) entered disabled state [ 1888.000471][ T8446] bridge84: port 1(bridge_slave_0) entered blocking state [ 1888.007623][ T8446] bridge84: port 1(bridge_slave_0) entered disabled state [ 1888.015777][ T8446] device bridge_slave_0 entered promiscuous mode [ 1888.025274][ T8449] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 1888.063565][ T8427] device bridge1406 entered promiscuous mode [ 1888.098161][ T8465] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1888.106383][ T8465] device bridge1406 left promiscuous mode 18:12:38 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8ecc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6558000000000000) 18:12:38 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48255cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:38 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:38 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) [ 1888.314038][ T8477] device bridge1164 entered promiscuous mode [ 1888.341032][ T8482] device bridge_slave_0 left promiscuous mode [ 1888.347360][ T8482] bridge1163: port 1(bridge_slave_0) entered disabled state [ 1888.415109][ T8482] bridge1164: port 1(bridge_slave_0) entered blocking state [ 1888.446477][ T8482] bridge1164: port 1(bridge_slave_0) entered disabled state 18:12:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) [ 1888.480473][ T8482] device bridge_slave_0 entered promiscuous mode [ 1888.496780][ T8482] bridge1164: port 1(bridge_slave_0) entered blocking state [ 1888.504129][ T8482] bridge1164: port 1(bridge_slave_0) entered forwarding state 18:12:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1888.564552][ T8483] device bridge1407 entered promiscuous mode [ 1888.645211][ T8480] device bridge85 entered promiscuous mode [ 1888.674594][ T8484] device bridge_slave_0 left promiscuous mode [ 1888.680994][ T8484] bridge84: port 1(bridge_slave_0) entered disabled state 18:12:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) [ 1888.738569][ T8484] bridge85: port 1(bridge_slave_0) entered blocking state [ 1888.750139][ T8484] bridge85: port 1(bridge_slave_0) entered disabled state [ 1888.765236][ T8484] device bridge_slave_0 entered promiscuous mode 18:12:39 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1888.815002][ T8477] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1888.837112][ T8485] device bridge_slave_0 left promiscuous mode [ 1888.843792][ T8485] bridge1406: port 1(bridge_slave_0) entered disabled state [ 1888.925933][ T8485] bridge1407: port 1(bridge_slave_0) entered blocking state [ 1888.936622][ T8485] bridge1407: port 1(bridge_slave_0) entered disabled state [ 1888.966008][ T8485] device bridge_slave_0 entered promiscuous mode 18:12:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}, 0x18) [ 1888.988438][ T8485] bridge1407: port 1(bridge_slave_0) entered blocking state [ 1888.995804][ T8485] bridge1407: port 1(bridge_slave_0) entered forwarding state [ 1889.065062][ T8486] netlink: 'syz-executor.4': attribute type 25 has an invalid length. 18:12:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}, 0x18) [ 1889.143740][ T8492] device bridge1407 left promiscuous mode 18:12:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x8fcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:39 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae485d5cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1889.266038][ T8483] device bridge1407 entered promiscuous mode [ 1889.286637][ T8492] device bridge1407 left promiscuous mode 18:12:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6800000000000000) 18:12:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 18:12:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'veth0_to_bridge\x00'}, 0x18) [ 1889.492104][ T8527] device bridge1165 entered promiscuous mode 18:12:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) [ 1889.562744][ T8531] device bridge_slave_0 left promiscuous mode [ 1889.586563][ T8531] bridge1164: port 1(bridge_slave_0) entered disabled state [ 1889.705251][ T8531] bridge1165: port 1(bridge_slave_0) entered blocking state 18:12:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfcffffff) [ 1889.748171][ T8531] bridge1165: port 1(bridge_slave_0) entered disabled state [ 1889.772191][ T8531] device bridge_slave_0 entered promiscuous mode [ 1889.786295][ T8531] bridge1165: port 1(bridge_slave_0) entered blocking state [ 1889.793629][ T8531] bridge1165: port 1(bridge_slave_0) entered forwarding state 18:12:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) [ 1889.843387][ T8529] device bridge86 entered promiscuous mode [ 1889.863618][ T8535] device bridge_slave_0 left promiscuous mode [ 1889.888856][ T8535] bridge85: port 1(bridge_slave_0) entered disabled state [ 1889.944232][ T8535] bridge86: port 1(bridge_slave_0) entered blocking state [ 1889.961326][ T8535] bridge86: port 1(bridge_slave_0) entered disabled state [ 1889.974611][ T8535] device bridge_slave_0 entered promiscuous mode 18:12:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1890.060111][ T8537] device bridge1408 entered promiscuous mode 18:12:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1890.116727][ T8541] device bridge_slave_0 left promiscuous mode [ 1890.138297][ T8541] bridge1407: port 1(bridge_slave_0) entered disabled state 18:12:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x78cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1890.176398][ T8541] bridge1408: port 1(bridge_slave_0) entered blocking state [ 1890.185657][ T8541] bridge1408: port 1(bridge_slave_0) entered disabled state [ 1890.194806][ T8541] device bridge_slave_0 entered promiscuous mode [ 1890.204364][ T8541] bridge1408: port 1(bridge_slave_0) entered blocking state [ 1890.211704][ T8541] bridge1408: port 1(bridge_slave_0) entered forwarding state [ 1890.269452][ T8548] device bridge1408 left promiscuous mode [ 1890.315269][ T8552] device bridge1 entered promiscuous mode 18:12:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x90cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1890.414192][ T8667] device bridge87 entered promiscuous mode [ 1890.474564][ T8541] device bridge1408 entered promiscuous mode [ 1890.515977][ T8668] device bridge_slave_0 left promiscuous mode [ 1890.552743][ T8668] bridge86: port 1(bridge_slave_0) entered disabled state [ 1890.611274][ T8668] bridge87: port 1(bridge_slave_0) entered blocking state [ 1890.618981][ T8668] bridge87: port 1(bridge_slave_0) entered disabled state [ 1890.626789][ T8668] device bridge_slave_0 entered promiscuous mode [ 1890.641191][ T8548] device bridge1408 left promiscuous mode 18:12:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x6c00000000000000) 18:12:41 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfcdcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfcffffff) 18:12:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 1890.684679][ T8677] device bridge1166 entered promiscuous mode 18:12:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x81000000) 18:12:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 1890.802232][ T8679] device bridge_slave_0 left promiscuous mode [ 1890.818535][ T8679] bridge1165: port 1(bridge_slave_0) entered disabled state 18:12:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 1890.912427][ T8679] bridge1166: port 1(bridge_slave_0) entered blocking state [ 1890.919904][ T8679] bridge1166: port 1(bridge_slave_0) entered disabled state [ 1890.928529][ T8679] device bridge_slave_0 entered promiscuous mode [ 1890.939270][ T8679] bridge1166: port 1(bridge_slave_0) entered blocking state [ 1890.946611][ T8679] bridge1166: port 1(bridge_slave_0) entered forwarding state [ 1890.976777][ T8684] device bridge2 entered promiscuous mode 18:12:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfcffffff) [ 1891.071085][ T8689] device bridge1409 entered promiscuous mode [ 1891.122853][ T8775] device bridge_slave_0 left promiscuous mode [ 1891.137840][ T8775] bridge1408: port 1(bridge_slave_0) entered disabled state 18:12:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1891.259162][ T8775] bridge1409: port 1(bridge_slave_0) entered blocking state [ 1891.281810][ T8775] bridge1409: port 1(bridge_slave_0) entered disabled state [ 1891.314066][ T8775] device bridge_slave_0 entered promiscuous mode [ 1891.333329][ T8775] bridge1409: port 1(bridge_slave_0) entered blocking state [ 1891.340687][ T8775] bridge1409: port 1(bridge_slave_0) entered forwarding state [ 1891.475089][ T8799] device bridge88 entered promiscuous mode [ 1891.496382][ T8800] validate_nla: 10 callbacks suppressed [ 1891.496393][ T8800] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1891.546684][ T8800] device bridge1409 left promiscuous mode [ 1891.561321][ T8801] device bridge_slave_0 left promiscuous mode [ 1891.567986][ T8801] bridge87: port 1(bridge_slave_0) entered disabled state [ 1891.601839][ T8801] bridge88: port 1(bridge_slave_0) entered blocking state [ 1891.614749][ T8801] bridge88: port 1(bridge_slave_0) entered disabled state [ 1891.628332][ T8801] device bridge_slave_0 entered promiscuous mode [ 1891.665367][ T8680] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x91cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1891.706121][ T8817] device bridge3 entered promiscuous mode [ 1891.846163][ T8775] device bridge1409 entered promiscuous mode [ 1891.871663][ T8800] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1891.895119][ T8800] device bridge1409 left promiscuous mode 18:12:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7400000000000000) 18:12:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x73cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:42 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfedcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) 18:12:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}]}, 0x7c}}, 0x0) [ 1891.955460][ T8933] device bridge1168 entered promiscuous mode 18:12:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}]}, 0x7c}}, 0x0) [ 1892.022464][ T8934] device bridge_slave_0 left promiscuous mode [ 1892.053121][ T8934] bridge1166: port 1(bridge_slave_0) entered disabled state 18:12:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x71cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1892.115983][ T8934] bridge1168: port 1(bridge_slave_0) entered blocking state [ 1892.132216][ T8934] bridge1168: port 1(bridge_slave_0) entered disabled state [ 1892.182408][ T8934] device bridge_slave_0 entered promiscuous mode 18:12:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}]}, 0x7c}}, 0x0) [ 1892.229282][ T8934] bridge1168: port 1(bridge_slave_0) entered blocking state [ 1892.236622][ T8934] bridge1168: port 1(bridge_slave_0) entered forwarding state [ 1892.264918][ T8940] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1892.301789][ T8943] device bridge89 entered promiscuous mode [ 1892.336469][ T8947] device bridge_slave_0 left promiscuous mode 18:12:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) [ 1892.363799][ T8947] bridge88: port 1(bridge_slave_0) entered disabled state [ 1892.425084][ T8947] bridge89: port 1(bridge_slave_0) entered blocking state [ 1892.439104][ T8947] bridge89: port 1(bridge_slave_0) entered disabled state [ 1892.448459][ T8947] device bridge_slave_0 entered promiscuous mode [ 1892.515217][ T8948] device bridge1410 entered promiscuous mode 18:12:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) [ 1892.589078][ T8950] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 1892.604520][ T8953] device bridge_slave_0 left promiscuous mode [ 1892.611831][ T8953] bridge1409: port 1(bridge_slave_0) entered disabled state [ 1892.668543][ T8953] bridge1410: port 1(bridge_slave_0) entered blocking state [ 1892.686260][ T8953] bridge1410: port 1(bridge_slave_0) entered disabled state [ 1892.714357][ T8953] device bridge_slave_0 entered promiscuous mode [ 1892.730404][ T8953] bridge1410: port 1(bridge_slave_0) entered blocking state [ 1892.737826][ T8953] bridge1410: port 1(bridge_slave_0) entered forwarding state [ 1892.787226][ T8957] device bridge4 entered promiscuous mode [ 1892.831282][ T8959] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1892.849600][ T8959] device bridge1410 left promiscuous mode 18:12:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x92cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB]) [ 1892.877323][ T8940] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1892.954840][ T8953] device bridge1410 entered promiscuous mode [ 1892.981304][ T8959] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1893.023967][ T8959] device bridge1410 left promiscuous mode 18:12:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x7a00000000000000) 18:12:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) 18:12:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x71cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:43 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e250745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:43 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r5, 0x1, 0x1, 0x48}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r7, 0x1, 0x1, 0x48}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r9, 0x1, 0x1, 0x48}}, 0x20) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r10, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r11, 0x1, 0x1, 0x48}}, 0x20) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='lowerdir=./buc,workdir=./file1,upperdir=./file0', @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0, @ANYRES64=r5, @ANYRESOCT=0x0, @ANYPTR64, @ANYPTR], @ANYRESHEX=0x0], @ANYBLOB="a8eb99fe09b659e6bddd25c299b680ca391c2a493dd4bb00b58c6318d358ba8e587fe665f7800031d8d4d7e7441f0b8571cc687873a1d5ac90b824efd5c93e98930a517c18224c7760c07c6127c9b6de0825a83db731020f084e37060c8f714f13db60a12b9fc3dcbcf0c9798aa096098bc0d1fbd1ce88790abbf01da58df687971113e8e04450a172059cfd2bfc584470c5c6d82ceaa85c3f5c8e", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES16, @ANYRES64=r2], @ANYRESOCT=r5, @ANYBLOB="7f0922477e2fc8abbaee89b467cc48c153e8238ca769eb66df1c62ec7d740b9e66e902ffe83767b23330aa50778ca31706d933d707c76faf4742177fe28e0308d1f504dd08c731de991b239751f0174248d11d855089ceb302892139e4479824b162d853896123317f8965a9d5f3d9cde94d727cfb720b3aee1ee5af1517f11319ce56a8a9c2f152ac07100127921877ed4bb26f41b796761107d27f18", @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRES32=r6, @ANYRES32=r8], @ANYRESHEX=r10, @ANYRES16, @ANYRES16=0x0]]) [ 1893.096273][ T9080] device bridge1169 entered promiscuous mode 18:12:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) [ 1893.194144][ T9087] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1893.243748][ T9082] device bridge_slave_0 left promiscuous mode [ 1893.254388][ T9082] bridge1168: port 1(bridge_slave_0) entered disabled state 18:12:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) [ 1893.376313][ T9082] bridge1169: port 1(bridge_slave_0) entered blocking state [ 1893.393401][ T9082] bridge1169: port 1(bridge_slave_0) entered disabled state [ 1893.407526][ T9082] device bridge_slave_0 entered promiscuous mode [ 1893.418750][ T9082] bridge1169: port 1(bridge_slave_0) entered blocking state [ 1893.420120][ T9113] overlayfs: failed to resolve './file0€': -2 [ 1893.426078][ T9082] bridge1169: port 1(bridge_slave_0) entered forwarding state [ 1893.455114][ T9089] device bridge5 entered promiscuous mode 18:12:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x71cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1893.516040][ T9198] device bridge1411 entered promiscuous mode 18:12:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x5865) 18:12:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x84, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x8, 0x16, [0x0]}]}, 0x84}}, 0x0) [ 1893.612112][ T9202] device bridge_slave_0 left promiscuous mode [ 1893.634441][ T9202] bridge1410: port 1(bridge_slave_0) entered disabled state [ 1893.726446][ T9202] bridge1411: port 1(bridge_slave_0) entered blocking state [ 1893.778231][ T9202] bridge1411: port 1(bridge_slave_0) entered disabled state [ 1893.805205][ T9202] device bridge_slave_0 entered promiscuous mode [ 1893.825536][ T9202] bridge1411: port 1(bridge_slave_0) entered blocking state [ 1893.832895][ T9202] bridge1411: port 1(bridge_slave_0) entered forwarding state [ 1893.868363][ T9208] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1893.876671][ T9208] device bridge1411 left promiscuous mode [ 1893.915156][ T9215] device bridge6 entered promiscuous mode 18:12:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x93cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x80, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x80}}, 0x0) [ 1893.963781][ T9325] device bridge90 entered promiscuous mode [ 1893.996779][ T9327] device bridge_slave_0 left promiscuous mode [ 1894.008639][ T9327] bridge89: port 1(bridge_slave_0) entered disabled state [ 1894.106919][ T9327] bridge90: port 1(bridge_slave_0) entered blocking state [ 1894.142081][ T9327] bridge90: port 1(bridge_slave_0) entered disabled state [ 1894.159222][ T9327] device bridge_slave_0 entered promiscuous mode [ 1894.181509][ T9206] device bridge1411 entered promiscuous mode 18:12:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x8100000000000000) 18:12:44 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$P9_RGETATTR(r3, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x12, 0x3, 0x400, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000002c0)={'ip6_vti0\x00', 0xfffffffffffff09b}) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000040)="9470e30b451f2e1700e5f91c4169c745ba664c10c6f2e62d806824570b868eeb2c8122", 0x23) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) 18:12:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x80, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x80}}, 0x0) 18:12:44 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0645bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3000000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1894.428777][ T9337] device bridge1170 entered promiscuous mode 18:12:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x80, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x80}}, 0x0) 18:12:45 executing program 1: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup(r0) write$P9_RGETATTR(r1, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) r2 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = dup(r2) write$P9_RGETATTR(r3, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x12, 0x3, 0x400, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000002c0)={'ip6_vti0\x00', 0xfffffffffffff09b}) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000040)="9470e30b451f2e1700e5f91c4169c745ba664c10c6f2e62d806824570b868eeb2c8122", 0x23) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) [ 1894.473624][ T9338] device bridge_slave_0 left promiscuous mode [ 1894.494829][ T9338] bridge1169: port 1(bridge_slave_0) entered disabled state [ 1894.576309][ T9338] bridge1170: port 1(bridge_slave_0) entered blocking state [ 1894.608189][ T9338] bridge1170: port 1(bridge_slave_0) entered disabled state [ 1894.630562][ T9338] device bridge_slave_0 entered promiscuous mode [ 1894.667847][ T9338] bridge1170: port 1(bridge_slave_0) entered blocking state 18:12:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x64, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x64}}, 0x0) [ 1894.675209][ T9338] bridge1170: port 1(bridge_slave_0) entered forwarding state 18:12:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x40000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1894.763932][ T9349] device bridge91 entered promiscuous mode [ 1894.889880][ T9353] device bridge1413 entered promiscuous mode 18:12:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x64, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x64}}, 0x0) [ 1894.945409][ T9369] device bridge_slave_0 left promiscuous mode [ 1894.968330][ T9369] bridge90: port 1(bridge_slave_0) entered disabled state [ 1895.011719][ T9369] bridge91: port 1(bridge_slave_0) entered blocking state [ 1895.019070][ T9369] bridge91: port 1(bridge_slave_0) entered disabled state [ 1895.036586][ T9369] device bridge_slave_0 entered promiscuous mode [ 1895.057067][ T9449] device bridge_slave_0 left promiscuous mode [ 1895.091643][ T9449] bridge1411: port 1(bridge_slave_0) entered disabled state [ 1895.150076][ T9449] bridge1413: port 1(bridge_slave_0) entered blocking state [ 1895.162837][ T9449] bridge1413: port 1(bridge_slave_0) entered disabled state [ 1895.171044][ T9449] device bridge_slave_0 entered promiscuous mode [ 1895.179372][ T9449] bridge1413: port 1(bridge_slave_0) entered blocking state [ 1895.186698][ T9449] bridge1413: port 1(bridge_slave_0) entered forwarding state [ 1895.207276][ T9455] device bridge1413 left promiscuous mode [ 1895.239926][ T9449] device bridge1413 entered promiscuous mode [ 1895.274675][ T9470] device bridge7 entered promiscuous mode 18:12:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x94cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x64, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x64}}, 0x0) [ 1895.317706][ T9452] device bridge1413 left promiscuous mode 18:12:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x40000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 18:12:45 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0845bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x88a8ffff00000000) 18:12:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x74, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x74}}, 0x0) [ 1895.609187][ T9590] device bridge1171 entered promiscuous mode 18:12:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x74, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x74}}, 0x0) [ 1895.662781][ T9596] device bridge1414 entered promiscuous mode [ 1895.695877][ T9595] device bridge92 entered promiscuous mode [ 1895.723419][ T9597] device bridge_slave_0 left promiscuous mode [ 1895.730963][ T9597] bridge1170: port 1(bridge_slave_0) entered disabled state [ 1895.793036][ T9597] bridge1171: port 1(bridge_slave_0) entered blocking state [ 1895.807543][ T9597] bridge1171: port 1(bridge_slave_0) entered disabled state [ 1895.828908][ T9597] device bridge_slave_0 entered promiscuous mode 18:12:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x74, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x74}}, 0x0) [ 1895.846952][ T9597] bridge1171: port 1(bridge_slave_0) entered blocking state [ 1895.854308][ T9597] bridge1171: port 1(bridge_slave_0) entered forwarding state [ 1895.903598][ T9594] device bridge8 entered promiscuous mode [ 1895.936951][ T9601] device bridge_slave_0 left promiscuous mode [ 1895.973679][ T9601] bridge91: port 1(bridge_slave_0) entered disabled state 18:12:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x40000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) [ 1896.062014][ T9601] bridge92: port 1(bridge_slave_0) entered blocking state [ 1896.072849][ T9601] bridge92: port 1(bridge_slave_0) entered disabled state [ 1896.081514][ T9601] device bridge_slave_0 entered promiscuous mode [ 1896.134624][ T9599] device bridge_slave_0 left promiscuous mode [ 1896.141164][ T9599] bridge1413: port 1(bridge_slave_0) entered disabled state [ 1896.256091][ T9599] bridge1414: port 1(bridge_slave_0) entered blocking state [ 1896.284789][ T9599] bridge1414: port 1(bridge_slave_0) entered disabled state [ 1896.293075][ T9599] device bridge_slave_0 entered promiscuous mode 18:12:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) [ 1896.301918][ T9599] bridge1414: port 1(bridge_slave_0) entered blocking state [ 1896.309274][ T9599] bridge1414: port 1(bridge_slave_0) entered forwarding state [ 1896.329611][ T9710] device bridge1414 left promiscuous mode [ 1896.355247][ T9700] device bridge92 left promiscuous mode [ 1896.407951][ T9722] device bridge9 entered promiscuous mode [ 1896.424872][ T9599] device bridge1414 entered promiscuous mode 18:12:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x95cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) 18:12:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccce, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccca, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:47 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0a45bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1896.590907][ T9830] validate_nla: 11 callbacks suppressed [ 1896.590918][ T9830] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1896.666192][ T9830] device bridge1414 left promiscuous mode [ 1896.737424][ T9839] device bridge93 entered promiscuous mode [ 1896.761918][ T9842] device bridge10 entered promiscuous mode 18:12:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x9effffff00000000) 18:12:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x4c}}, 0x0) [ 1896.814788][ T9844] device bridge_slave_0 left promiscuous mode [ 1896.821971][ T9844] bridge92: port 1(bridge_slave_0) entered disabled state [ 1896.891596][ T9844] bridge93: port 1(bridge_slave_0) entered blocking state [ 1896.928152][ T9844] bridge93: port 1(bridge_slave_0) entered disabled state 18:12:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccca, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x4c}}, 0x0) [ 1896.936640][ T9844] device bridge_slave_0 entered promiscuous mode [ 1897.019286][ T9846] device bridge1172 entered promiscuous mode [ 1897.073910][ T9839] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 1897.111861][ T9870] device bridge_slave_0 left promiscuous mode 18:12:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x4c}}, 0x0) [ 1897.122163][ T9870] bridge1171: port 1(bridge_slave_0) entered disabled state 18:12:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$getown(0xffffffffffffffff, 0x9) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) lstat(&(0x7f0000004480)='./file0\x00', &(0x7f00000044c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000004540)=0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r13, 0x0) r14 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r15, r16) r17 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r17, 0x36) r18 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r18, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r18, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r18, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_FIOGETOWN(r18, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f00000005c0)=0xc) r21 = open$dir(&(0x7f0000000240)='./file0\x00', 0x10000, 0x83b2f476773c9c96) r22 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r22, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r22, &(0x7f00000002c0)='threaded\x00', 0x10211) fallocate(r22, 0x3, 0xc000, 0x80000003) r23 = socket$inet6(0xa, 0xa, 0x8c) bind$inet6(r23, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r23, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r23, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r22, 0x89e2, &(0x7f00000004c0)={r23}) kcmp(r19, r20, 0x4, r21, r24) newfstatat(0xffffffffffffff9c, &(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r26 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r27, r28) r29 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r29, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r29, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r30, 0x1, 0x1, 0x48}}, 0x20) r31 = eventfd(0x8) r32 = socket$alg(0x26, 0x5, 0x0) r33 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r33, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r33, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r34, 0x1, 0x1, 0x48}}, 0x20) r35 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r35, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r35, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r36, 0x1, 0x1, 0x48}}, 0x20) r37 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r37, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r37, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r38, 0x1, 0x1, 0x48}}, 0x20) r39 = syz_open_dev$vivid(&(0x7f0000004640)='/dev/video#\x00', 0x1, 0x2) r40 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r40, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r40, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r41, 0x1, 0x1, 0x48}}, 0x20) r42 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r42, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r42, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r43, 0x1, 0x1, 0x48}}, 0x20) r44 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r44, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r44, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r45, 0x1, 0x1, 0x48}}, 0x20) r46 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r46, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r46, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r47, 0x1, 0x1, 0x48}}, 0x20) r48 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r48, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r48, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r49, 0x1, 0x1, 0x48}}, 0x20) r50 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r50, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r50, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r51, 0x1, 0x1, 0x48}}, 0x20) r52 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r52, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r52, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r53, 0x1, 0x1, 0x48}}, 0x20) r54 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r54, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r54, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r55, 0x1, 0x1, 0x48}}, 0x20) r56 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000004680)='/dev/video1\x00', 0x2, 0x0) r57 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r57, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r57, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r58, 0x1, 0x1, 0x48}}, 0x20) r59 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r59, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r59, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r60, 0x1, 0x1, 0x48}}, 0x20) r61 = inotify_init() r62 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r62, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r62, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r63, 0x1, 0x1, 0x48}}, 0x20) r64 = ioctl$TIOCGPTPEER(r5, 0x5441, 0x2) sendmmsg$unix(r2, &(0x7f00000047c0)=[{&(0x7f0000000180)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000b40)="6c54dabb2daf12889cac5a0b11af84a3e0c5db7813b5d669bb3095b152559b31f866563b9003916635bd6b1d764890b8c081bc7b3fa68e041d9bfddd9789a42df861e903069e2a54e058e166e207fa68876d466c83959f6cd42b6072eff9888e370198800a9d1bc7e2bd576ba852b59abcc2423fcf3d51069969d117784a1426556fc8f6ae86e7907b348da180ae8fe531b24677ffdfbc77d6f1e4e63ea2d8ffc2786e09d4f74f05ea378a5a103e1fa4590b557de8614e604a9e94117285ae7525b507ff8fb209a830ea68ef2c027bd515174aa7c96e836ed33dbd61433096200d832fde538f488c95ea0b74413cc4419dcdfbf7bf195aa647589dedb82ba6b096c15942841dc92e907de94bf6b6a1bd506138e35275ace584553f2141e4b1008bb1b17c5d32091c804b17cf2ea5d9c8f1876be19084070af0c588dbd30c5f1db9ad18b85b0983823e1b9cc1e055c3d0fa528f4e182f9ac26dd3f89cc7f39b04e338ac325618b34ae82c7077c54f830e3593d4564bec6fe3e6f5c64af79d8112de01268a4121c799ef3834f23e60a0848c1b8f834362d298eca4cd790b8c5ab0185c97e018960c20437a1044ab907aa581cb0ec54a872e7a8e6d4bd0475e641022f6026e1b3db4b589c70d28145d0299c9ca102c399d1d9a55ae5ecec2c781587291304850798f7f388dabe853cfb9322966c2bbc35e0e3fd0f7579f18802bc23c83b599e9ea245c36c98322901858a9f9e3d81658c8cd9d11a6c5834abdbca9d864a6ac61ffdd002c0c22a3145d6f675f63251fd11c9683f4e42f92843f00b60bda72a2aa04475cb617c909e54b57aa500b0c6acc479bf6f1cb9139a508fd2f25d50ebdfe2bb8366fc7de0a4b4b977cc9beb1bfe72c816e7a7ddec3cc61817b758bcf645adc52a4a051133d93875542949b7c6530d026e435ec15cc7ce38d98e5751f96226db6b2f0ce0aaf8106f4e21d5ec81a75b702e14ba3ec003d331fb1a6194c1863654f1038e6d9f323fdf920d36435d2ab6c444e1e5adf86722984570892c0bfb3212d99cfe24fde7d52acb30ab9092f280df065711d73ea8b2cce7cab986f96b21264f9765a5167dd382584ce91019efa384a6ffacadaf5a83f8e7d5e00e367c96270fd877996f285c692d1c1230c6f1ae56db13dea6e65d3aa7d7dea8e4279ae1aa92b6e005871ce48809d8407d131bc05ab8eb4540481348bfced6baa4e908896762b73da1688ef46c64e905eb86032aa113d8cafe920effd4c222d7b3b0ef2f14902b9914d0c69a6297302e06c60e862e6436a292de649f2a50ef0ad53d86fb45264ffd1aef6213fb387eb74c438c5bc302485e96ad2a31d0ad81bca911f332901eb0ebc1bb150c14154457a709705d2493506fe30d091a510d721f9ef77f372063386524d1de612ad10739816032185b91a3e9d5c5b6ad702c40fa19a21c5352d33df81611f7a05d14f48b95dba1ee18cf267c12b99c64149477bd1001cdbaeedd43708f2ef53aad857486e2d1d04e7fcc6abe54858b9071e0563f16b5de8aa65a63fe8d3c1348ddca7e3ad4905d7bd597923c59f70f1fa0bbc213aa0bb1ce161e158387695998d34f5d043c0a759553388d2385e6145abf09eb3360a1a5f10aa3e4aae52fd7e5f64ab86539a0d2b89753ee6e824d14b695d354e7583176530be9d5a33331231a09df51afc181f200baa442f900b53fe1f6ed95df932c2647df39feb64f4b61e3a99d497cc89794cb5977c69ec80e812d13cb7df15dfca735777ea871a3bc458e6e8a4729e5f204719573b209c1ec90073ab9386932e3871d838aae8484cdd615fb92023d8bb0fd9c81778d7cc829f5299b7786994d2c1206df1c5d840b54f96bf611cacb0a3ac8920fc0b2f168e6519d701e1ea092ee03e3280cba8fbc4c5aa66ba29be6c21946ad90fd6c4b3d35fed030988405344fc183cb7d0d3752d7ca9167eda4e22d89af467505cab332d1fd5280b92f6b4ab8a09c952bb02682be327d87db1c1bfa52500cdc2e829b81326a8fcdc4f3ac8cc4928d4b5e33e3e59f31acc07e23c20a73f1d10bf73f15fb4689e2e8d08a0688da0b697371e1f4619fa9ac46eff37165a646c76ba804fd585e3b36a5dc64fd3db7c6a95b7510db7f9e98e3c453f974c75c82c5a9ae113b40085b6fdf5d852c577cfd59a7e560dce924009b4fb96084accf4f5a1fcbe94521bf0fa6c38d4eab4f8ee39dab42535f27dd26094eefdf2d92bd79469a3f8c3091146f5a79783169b27971e8f53835e7c347577c7e87579000d4f66f84cbe6805562f9cad2bcacb588ee7c9970def5826d24d64bf5351419e0e62dda52f1e91ff0ef3bef25ef9ac4e3eb349e13b88659e2280c9ad7f530123d1af71058ffea14ac1e5eb46dde1a22d1d8ecf667401d1fd7948b385a3c0fc84cea406814ed8a8ddaf4bed2689281cdddbc3207ef217ab68f54ef5d2235e4c600fe6f5e91f0a577da75ea68a6321354231b97517b4042ea2d303421716e31ae9e00705dfd39d3a32894553ec7193b51a63daf8ebf7f51547c7322554f30fd56ae597da7fdeaee718229160788e59903a0c3072e941e7238809392a9440cfa1742d44a4d1561d11b6da90a49d4bce12d2a49f2f0b532a12ffcd692ddd4b092275bc6fb176cb731f7c4635e9235a6f08a8397e279ea23507b5e3b78f56cd4ea3876867afe010e4bbdac625e71c37bce6145f2ed0cf6a085f474ea5b3200f0aaa50fac8d346ed6a9ff4033b58cb8f695d2f0410e2f1d138f9660f6b4ba66f9c4dc4c18768de3c38b4a45c674bbd0de4134080e6e0be51214dd55a59616c00d74bf478cf2a71db9e4ad987ca7601651913f7eb18af48a521728261cf36243b25e1db6731863700ddbc42c87bff1f6750abe63208dcbac312dc9425a3115aceaeb35c5a80ebb75ee855c9af6560b35d9378620a9b2e129efdf40013bc56ce77c56feb9f79a62d6990bda86bbca4875b8fa27df197d95b2264d50b9f69cce9dde31a889ad0f9c9ed67df1384846722b69ecf9a4491092fccd842b2bd4feae5ba63b9d49d2e1f235d368822a5de23c72bb7039b76a242640546d638ac27bad6192a9511ecf39773c72e12708e444c4aa425a6d2e7195727c94be7d3697b024140096a6a7f6a082eb03a3d4f95ac1877713bf5dcab8b1f75ce955e87f2c1269e0f4f8222a35e8b10dce3215cc9184bc065ac258aa8c1b166f9413c6d5a5178f554663de5a75c1e3f46466c34674c161405de53fe693798fa39d1db368a7c00a3df63d5798a398a2a936bef8bdf12c99a83eb8b8f207affddcf09514a17a4388412a9f4874800854e1cf57b9c5fb947baefac08a0a415905b31983291acadd4bb6b75788384f677adf85c975e50f3553e7d92fe7d6393bbf1bf03aea646aad95a328b08b5311f11e7ddb4f165431dc7783e4a9dc6050f17600b80bf915cd0726397cd2c30df1a73988217fcb0c850c406a42cfc39b01bffeb9eda2edfd9bb219854c79a6341988f239be9c82d09529e5db049b2a3e8a609ab64b8ef21072403e6c615c25e435b6b3059896f24addadd5d5af563e150732df6183c2b70027c395bca10fc20527c079ed0983540a8b31c075fb29641f5894ef07740ac7b9fb3f385b053a31486d116d533ee76379dd6390d87f3a455606bf7dc4ce1404ae4407eca72cfe0035f4becda7b19e3d8148da69d9d26a1dfa0f8482a708f77dc6c96de83dfd1876fd22b4d9039eedafa0cabcc3b0b165bab8c61b13abfd5f0bc01624d24ed30ef58fe4e4b1ada14cc5d0ca65e36eeaaee13516031afe5d2b504229aec3f3ead363d3fac3c81f1c9282a4d0158cdf2394a1dc8b97596fd57229c19953aa2e9beb5970aaae5ed527dedb26440ddd8372461dff44bc85cfbde9c857df33758c06a1d4fd208ca66e1ecdb95ff2aec2e9ec9b0380085bf71772fc11c4b67b0f787f0074fd5e8e6f5242aacb9b44fc7dd8071e2e439aaa4d1e9b76c9fbbabf45d11ca1c15abfdb8ff2ab5904228b82b64c1a52f4ea0a647e46a917568f8c374495c091547b4eb7bd4bf6d3d0a633000e477975989c510b1e51cb8863d298d83fa04da0b493cbf378f71dcc3df2982aae36233cff1a66a268662142565770d4fac9ee090e5e4168b45a6af61cfcfcbfcd10f79c00fd3fd2c1a242b5ee402452b71e0e3323614d7af4ea4606f14be6954dceb464dda52d0076e19235ad4d822bcc3436bbdcf1440676ef294b5728f6fd4b735e73b182ac69ba4f00124345d3e9b106340da93fe0533a610ec43e0a3456b76a35e31225ee969d6e7a17d3865728e83fccafa9053731e418873e08a6d106d5424842ab86bd5d385cf520a8674d5e81ba51bd4247dc8cd40bbb2e575f25908a5a6c36d05bcb5a91cb719d697672b9ff179830373aa0bd6a06dd9b62243d621cf3fc0eb66bae1e19310eadd40869c8bcbf474b7ab05cdae817e51f82ff04695e3ad9b1c00d38aafaed01e5863931c085a37054855c3bc3f5974d84bc23bb11bd79f4236f050dcf2d826e7fa46104e966fa0f07d1f5abfd8a83407037372a8e2c89782c2d22e5d021fde1c3ddbaa9ced34ad73b520069f61405df31e6780a45dc8da9e164931c67b2643e351b7d4dd93c1e82440396776e075b9bd5e31dabb748aba51542bf430b51878c6f1667a8f84aa23d99b71cf9b6a5a9f0fcbcb39be3f81bd46e8c34ac8091c99aa0ff920a7b35713da1b356350c32602bd056fc752ae1f4006fac96f4525c91e573862682ab2c910c4123f0e871b8b0992afd6c1535a3dbb2abc03f9697c4dd02ef6018af3cea8c04710c14ea1d706bebda3918f4e7a0c3dd758f156aa9e9839eaf0b4dbe5a3a6adc9b0c7fe8b89d9646060801cbe81c9ff6754e8fc0aa0aaebea414486b0fa78e0b489ebdcccb0b24563f15d7611330d06fa79422f0ca5f461bb442d01f6a3e7a3a2cbff9265ed73fba1fc675d55804f677c655c8b2d26c45582599675d050fca96a84fb5fbc0b21d6a4b32183d1aea33aa8341337949004a018a26176052d546dec886802a37e5a79e7dbafd0ce6c70f071b4ee42d609847efae4a3edf58182ec7a16fc04b137fcb14f1d9f69f45fe83e4ff246fbfef5b32727f162ad6362125f1a99f9cfa2eb36b66237dba7d4a0552741e77129775e032c86ca144850d75608b6bb0f7718ab05c1b0b96312f748f32ceb007b962226a759c9441867776a1f2712fbd5ba23ea594b1e5fe20ee38a4a691bcf6d7da7a841f33bf7c8acbbb0fb4d03dafef3d2ab0d84a10d851ba77f3a38cc1a44cdbe60c19c23a378fa02dd2881bea67f0fde8d23455aea357396d95082bfa39e894114bd9154058f8466afb755afd22819cb879a9da044954790a7f03fe05bd5d752953109d0ebc46f19404f93b7c78fd30f3dc50ba48c140a59cec4d630bfb7c505c25c76b7c3864cbd0319e3a692bb8ea31766789d6265484bbe5b2103c447c27fd87be00207f27cfcb6470d7f885abcdc74ae718658cc1e22ed1c63b3468d2984bb64fca7c8b16b2c7ec32fc3b3b60c94d2fe12f75203d388d1949df07906d8813445b0d1aad90bc54e5bcd482063cb594929645e380b6a1597aa2622db6b1bdfed08b18381c80cc0ad9b0f7b5addf59832b1d3a211b91c06f96b260907d46870207b3c7aa39779ea4f4081488e69e5a4c41e7e40b533c6740f1bffdaaffc29ae77c70d360ec61a173c871a3387a12a131b791ef2d4214e052faf1eaa98ce33b9757285dfe5cb45420888a4c9cb37a18804da95fa2e61d6a32747490c", 0x1000}, {&(0x7f0000000340)="78039e8050d28d0aad407267a22f511db378befe721e21dbcc0d6a9648021de8b5686ce9d133d736984767c6a5fe2304cea1af2094238ac42ba0f1f04193c0ef4de015c613e8ced24c765a09ec1c4930a8de354bd7579880d79c6f35e3b2f58d161850f8f79b40f9540bbd0fb4ed7eb70f7ee594ce7013ce6aad8daac08e1c61c10d705056c1e66ecd27f7c5bf1baa0e0615a36be85f299dac16d4", 0x9b}, {&(0x7f0000000600)="8455539b5e389eb75909f35d0221e2197eec1376e12bf6deb58ec1dd7c2b81c4258b0c4b1de8c2591cab3094362dfbb069201308c2e66d191da9a562a6a2eaa00449d3540fb415bb80ddfe017cb3f9a88ca1dec7f91492640172c57c4155bf0d98f50149a1fe39722864b4cba806ef8b09d5299b49f86b854524e4fec2310a41b99331700a120402a2878b84631a69711be86f4f050d2e667a67dd888647227ad67699ffaa800b5893a4057a34a9b7d166cf2c12ecb95328f228a1104d8ac8a3e24ef30555ec0f5da35683f18015c79e4098a57c90ee5a5de38cb8b02cc1d3fbb0fe908a5ee89bc0ed1085b2ba", 0xed}], 0x3, 0x0, 0x0, 0x4}, {&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000700)="4a339aca551c70459790adf9182751ae568b", 0x12}, {&(0x7f0000001b40)="da88faf29be8f100215826b2d6d0e97bdd1dabc44ce4907ed535b07c20cec43242daba580867cb490d1cb945673625de57407122fdc7969d7c8528b2c5ced787d76a2786bace10fcc1590474b829ddebc205fd8ae329f33dba20c7e2b36c389d73cfcb83b6ebb5b84cf1a9800731a05d616b19f6b9ac6cccafaa8efde72650a8b63ba30db338a4d55de2d4e4f2f9acbc70652d4f135a1c5e7a7494a5ae6d2f36cb4dc440a3ae6cdfd3cb933d8ce0339f681377f0ba1ac095c6b204c80a30387064ee87c918e487f5011166622132937cd31f76d2c0f7007e9f3fabf20b268518b076", 0xe2}, {&(0x7f0000000740)="f40a98daeb3693df77f52c7fb6f478c7547eee0effb6e9a1cc1aa2f28ba62949853a0f30774aa6f1cb9cdfed9897aee01aa0017e07edf422e99e54286ac86b526946518c4686063d073d915a3a9f7a74b375d25fb087a1a490d3d2f42b1d670f811de939dabdc6691fd8cae4d98c0a9f39ba2472a285fa526db79fc93e317f4e08b50088d8088a3bd0186931aafcc7341f0cc9c00ed7169924db45bf070e03", 0x9f}, {&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="3adbd96a3eeb54eb3383ed094a078f98f66f92a854bc865102cfca9407dddfd1158d0c1af051eff29c8f4c45a6bcdeb26cc9a8ed6ca4b021421f041ff87a3b65e94144b4fc5df0d7c9901de454f20819e7002a821951df235e90e77b5440fa7f937e47e1035a64abd97bbaa8ee0622dc17ada95f07a51b003c32750f6d43ab1b9dc8fad1c7", 0x85}, {&(0x7f0000002d00)="ceeea5e026b5a3c93f2f8317064900aca0c1640a8706f6dfb1745cfa3a4e771a9c29544e5b66a5345c12677424d4b8cf1195e25b6ae5e9781c815db8a0db3f9eebcbd34fab6720d610ab81b20a4880a57c20445637cf287b80b57dd49674b73e8a134858d05fdee835b3c0651c73aeba910a3659079999a2f3488d90df2cb5bcb57fae01d9b1888a0e0ed37e648a94394bcc6af584d51227fb7809841d6651de3c67bae833537f9dafad5618765eb6296451db9fb0835f9c21e686e59146fd524a36f03552c2", 0xc6}, {&(0x7f0000002e00)="85e989680a1bb9bea087edc5fea6f2ac11bd2705cf14e9f275a9e8ce5ee615e74e0cc21180e8f153de409ed3dbff29aa4c86118c77e58e3b40dd8b57e4a4b0337705bdcd2fe31105f837c22d68a1302d77035828d7da1386184e71970c0f40c6f57f5017f3dd1b94fb7c5370de4477dd345d48270fa1a105e338e89a67ddf75e7c5ab93333670c9dd7dcc038692c0915c2669be2885649c593fee07564ddbab2cac4b325e0efda0f6343277f7576e183162b3f77c0175c84b9022b8963a10fdce6a4dc083cbf79d4", 0xc8}, {&(0x7f0000002f00)="1cd11af5b21797dc557e8186cff0870033c79e0418e58270ccbce5e41386639f70530cedd2857c4e6a378fd0e67d5ea2143d3c5d9d213aa4eac08b08de349ac5d94d47ebd3a2ef2775bdf64e3cabaad2f555969d613eb912e48c2017b9bc09b0c5ae30fca3f468fd14007284809f24e65bb28e6cf35339f3b63d9827ae4060d505934a8ef1772c011abd06ada222dc8bb43682893158fa1ca908fb38a36d94a3b1928ba3bf0dd682aa7c9f", 0xab}], 0x8, 0x0, 0x0, 0x4000}, {&(0x7f0000003040)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000004400)=[{&(0x7f00000030c0)="7bc0594d2212e6fa35fa42b80375dc336c3899da6ce5e335f70a2a9e86e76c438e2e0ec4ff029cfa8c0363b19f8d24a9d3f4ea8b4f13309029f166156c1072dcbd913a9e45b747dbaa44a74dc9133da82aa033c9a125d623fda71347bfcf5c421eba96ba19e583fb6ff75bde34ff4f3b41a093eb98c118f221da1dd6663baddf2fa5", 0x82}, {&(0x7f0000003180)="d0a07d40878c36747761d856faa72054b109f6411ba6a12ea7", 0x19}, {&(0x7f00000031c0)="156ac3d778366b5d7e74a53c04444bdfa9fa0cdf5cca2ad7d65c3ed56aba4eaf527a39cb39b38fe25e9e75b397b68b1213da01950c3677c44d2910a2895b282e9aee8000ebbef2eead4d56630297a872f2cbd0e802926ef295d7ed774659bd65a9ab9820ddd3d24b1eb0064a8ad1f6b5f2c5161b51f6f7ff2d3104e56c170c60e33bf10343bff6bb10589b3592f6ad0984ae", 0x92}, {&(0x7f0000003280)="dfb88f8780b7227dd29b87085133b25fb5d1950c294fafd3ee6a3b3aecf4d2781e547882216885333f46bdec07cfac297c1fe991a6f3bd24ad16f4e97e49dff9d45d0ad23a835da97631be58ccd36359d97476dbdc4860c9ddbdbc164a07ba569019523ea538534591568a6d918476d23290c632a2a6d4f5460c957798db8f945d1a7ee3e213168f10321e6526497617eb9a115434ff5212a718ebd18c1e248bc5bc6d17f9634e01dfa15eb4030176520385b36ff7fb05f720f88a6d5401648c0cd6abaab6fd1b1132934b665ac9e4e87517ef91babe492ad4c5b0b8e29f4e5d76fb818b7f860cddd45fe82d1fc730d958a4", 0xf2}, {&(0x7f0000003380)="bdb91ceea03db9de579b0b3ff79a29a4fc4cc81d9a6c175a30095992964fde2bea11b5372fc00d9bb721f66e92a511ffcf7bf556692b94870e07b872544fbb3a24dd6166ac7f57c773b48f5e732a132f2cda29683c4502ae7d4b7cf461616e84da1082534925a9e31ce693ea0266dcf04959d2a69b4ef7b48fbe02313a5ef98b6f4b90eebcf7be3732a94df63037d9796276303765c62b31b2c0128fcc12dac2161266cb52d3b250bf0a8f090d752f2b9a3bfff2d7bd1683a6efc4080644f94d6ddbafda359b06d557b3804944a0591026a30d73b20df5302c799bf769552050f302605c113d46733925ae134ced4cd08f29047883182bf2aed902ec58591f00321ec268e773c22fb4d466501cf1c332ad4615451d3b2b39de435afd2da5e77f07fee470908c38e842339cc7842c27cca3306a729cd86ca6bb94f4c8b9b156184a594deb0c5cf1aaa260feb0728280c02090f46ec790ba49cab773861a8382af65bfd1d672c1f3618a702b3483e8e226a657e31eda5177dc967b9c657f0f902ca01d483de1d53aec8707dd56aabd7f6111a28bd6aba9fe8ee35c256ce0c2decd368624472c4e457511ac95709a9f4d5d20c0889789aa9f85b319e4047fe852778b6418bdafed081e3efc7fde5a44ea31a0b26c0664a22d8a4c2ae6110f7743ffe51be9190929a6d0bfc0d6b6764d3734668312927a76638fe951104924a1224b22a2d01c6455a54a16399ebf5a7052834f34fd63c79c76c4a506d7ec038ce9bf38a4660dcf8a902d9e6b4f30a9d85ce59a183077bcf7e701cc2ba9b4b716e7e615cd05302355bb0bf4190af0494530dd24282dacd33a7bb8db7bb8a24a948d3d7a3c7f95ab806e12e4d5f66b2043287efc2ddd6c43891b246ae402c2846114cc375b8e13dee8ed2efd8cea2e0b910f5fa89574b269765c49f33f7a31a565f8a33f720837550370714273bb9996f3f10aa85fee618c2efcc2c18da0f6d20823276ea213d2bc338dbc6c4603e76a5cd99cd15e0ab30ba6a297dc402eba3d54cf597d31a029fd23da603499211748e9f0a57616534edf345b5890d250a3c8510f4e47cc4e64662cc7239a795a1dbe53ccbc872294a7da7bd94b39db42a50354bdbf5efe0e32ffce71ce78264f1c8c5c9d0f634518181bc5bbbda63963b986c9284fe7fb7542b5026a21267a3ef6a203e6760f194688484e4769e4f7066349694563fbe691142096692f8c42cbd5930ec73a848f829dd1d7b94d563fd3231008c22f7de09e6df87b715e5807ac87efab2db7fda1ce2beb4a8ea9c3f254a4df62a95ab8f581800e5a20ffaaf1f0edb32626193434e0d0c7104c3a29b6fad51d19a356ca793660227f8f8733edc224dfb42fca7f52c0ee24330f233708ac83f6fa8979b9199cec884692299fb997d878bcb6e0fb08074cd2fcb1bebc590601d927b6262c9b5d7f9c24aa6c042643ea4316ae2f0ed063d80f06b27a3c7e7dda0611cb58219fdf4395e2991748b9ba9de9ed865e72cb0573d52c58bdf85e375f93cf5c822a4c5e2142c2957b7d7defd907bdfe8fd3fa8ef0b91991547237c46397c44f0918df36aadeee985ea383b660d39cec9498f84a59b1965b0f36642ecf617cceffdeea9c5127610458b8a6707cfb6ced5d48ad585a65e07d3e8a01bb639dd691428502d2f181a75683c2cee29ee9103fcd82e6a254ba8a12fb7b63933a814064a056b4ca8c51362331101f211a1945989f84a7e679ea3ea4fa6b36b04685f38166260d659fd611620db02236b7140659310f2dcc0562e59086691aea3d3e7060f65304405d4f426ef43278f39cf5cb325e861bfceaad99e76bf9a51c15f3673d1dd122a2200c9dc21ec14065e836dfad9db62c52ebea377a76587773f7f2b947038f13f40397b08c8d571a7680488375d2997e9b3e569d1a264dce21b82a160b455b225ff41d803c2bcdcc5582b76381d62bad871026b73ad239e628b9b4915c4b93a62b49272265d3358680ba2bfe8b3145f703b817e31eaa911b60f64624bcd459bdef0d5dcf01a4b9c9f75d67844da15ccb8b1b40c8103b7ac8312c072e733ab413fbc2eb24ba9f3d47382749487ae82fd8519b630b837970e3433122dc7515802314dff45c9cfc0117bea0f2b3ab7f08f43951ea65ba25ff04c61619be60122690aeda5f83e53a7759079e636489952a34d5086e9c7d97aa2c4d10b69822fcd8bc7c1e693d201b58bbc9fcca2231bc6f9210c7531cc1fa266ec35ce2bf5866b75219db327c61192fef4febb4a999430b9760c7ff496e49e65d1b4fa7feaaa26df6fd386300091f4d90b964ced9461a15bffa6efacffb79aa4ba65b9483bba2750bf01cf3bfce828bf38412a73af0ce17991a017680e05e326ce5138a8781b67da318457aac5e9c2880f567b344b38fcfe7ada827ee2473db7d2c8e21b68d668092766909d926b4be302805c8f4c30b33fe6cac584633f0036b169aa4174859d3cc2a79fd67633b20e0603f9d103abec2d97d7abf729a26fdbc7b5b7684f53182dae6baf840e87df3e2a3af27598ce2f8c9e56965727f619d0b9488dfc805e049f5c0263e91cd8db6cb4667564e38a6a3be36665c0d378c5109024fef4c8958cad432e7d9b529711c5d25d8623cf1689483577bc1c202ca341a2c8e5c159fed484bf5b0096d3da0c1d9f9101ad95d31bd6ae1abd14b6b03c569a6accc0cf6173cb8df060bbdedbdb90f33dd3b412172cec8f6db546d3527f9feea76cbee3d80e20c9cb1b1030d3778a8ed2d97ff5a1a3419e26ee395d3ab6b49391f7dbf890fb12edccb29631af24031ffe4f2a28db91307a39c2043ab609ae7eadd97244057b25e4894cebe196977842641982f488d51d785415c1c12f45780d6a6635ae5937cb2e7db49c01653eff519e2e0c42552fc0df52683097c6345250eaade9a9340f6f48bd08d1f11bca8d632ddd159b134b89b902331c20b3d70fafd6943cc64b9c9b89e2bc3f90a38a40fa9f4029bcb914d04251c4c94db2976e2733f96c24f18f8435eb7ffa6fd7a243bb990f2e6aaca211d53634c8604e8cc0feab0a93cd536ee39894be8f267c4bf8e6571cffec966aa4c7f3322ccb7142b7d6c169d93a8d8c4e8a42857b587651649ea9f1f6431491842d39bfa204df39493f8942c42a2c8113251466eedb5203c24ad07f9c4d99fcfac9cd69a24dcc43de78c9368ae4503c40424965cefc636531ef9911888f357f1cd60be14af1c4cd65c98b0c91ae6c631691dffeebab93a754ce88aea17e9b47a2a5b0ec96e33f2d11c843b996d2aa6e57277ffffaabd3a936e2bd69fa2a6c63e63a0e416c1101528bf70d6f41ab38501e2148e8b94fe2b1ed0399b797d8a269247325d9d5e2007f41f6b1f79f8cc4d6b33bf1e5d3511cf0c19919b9823a548e1ddacc3297e079b85b9c49858f8c6f4bfe14392f41913bbb3137640ffe1e379f524a0e5581f7eb9cdc2dd55be5856943adc3458e94c3ed3715055ce538ffc3d5c1c6465eb5a80bb8043d746b4bf5179950df2dc0838c00ecd8ea3136e8a735f32f2dd2391daf07a8ae3d17a14f0db1657aeb3a89388e296d471c4c7d5892014cbbadf78049216c0353e95c47f5608d5648d7e11c221e794f4c38a2fb023341bdf14d80195c1662483ae6c654a74269be256f58471e4607423d00176de26263eae880f9843ab0a58217d4cc2fbdffa592586f76fa2302a879a4e0009063ca8055c862471aa9d8955acf4779cf55e1106d979227c1eb4b210fd0e024ce49e4ac85b605a4227d99857f51ac470352c639b3c6cad3ae33b3bb071b89695f20a2c7f9050057554005684b5b07cba0c639bad31935064df635723c976b6e0f08ae9a39860f881ecc576b4b6e590ec91a2a7f480bad3630ce8d5a4f739d4ca2d5f897297e8703e630d208d1eb83f4d5044c06299bb3dc515f89eb009f055a078dd568663d7e2d6754b9c0d134088625b7d62e5fc70e3372d8cf72d0a1fddb428b19f2018372879310f157c27ed58b77252eb454d305a47ee4ae2a24931b665292313f5487f2d8fa94ea99e5bb06469242329eb43d21f6b870ae15e761a0f644aee37eb2685450b1fbe7c00e432ffca23ed02d96f7a86122b64d7fea2947f62b4df128c303487ecea52a6832d81499bb90f442f3bd2605aede4132cc520f16312dcf3a1fedc50c4fbf351636fe18e8bb0a68f2e61a4de900a522b7455ee4bf637978a2df563f1edc2ff6a4c42349630d8bdd755d7577f56b6fe9482ce4880280f36ea89d12d7efce114835b5dbbd12dc2f3534854db7b655777c8d4a094f93e2f33bdb6873aa196e494b16c72e74613f9ce729162972fcc23b31f0d5e680fdbf157babe0160d6cf92ae477771e26692747a2b342d0a1431b1f21ee30bcb00c641e6b21e382b53eb21dfc46c861aabca5605396ba4fb27c1178be47d1020783af34538f5a6224a24fd9eca179c0cdf8eba53c49c78a597072c065271c36e62b0ed5708e2ed477b1cd491895aad0efac9d6da7af5e325b9f9d04ac6c9542ef728c2e04df2b84b6aa306f73d35a912e3ec430c361827f54cf3f4267aebb270ea95c858abecb58615892d93a8d869cc8b4154499d63a717df0fa17510675a45817bce228633b6329aa62f4f55899c92b8b65572d127f57f6861371dc5f513f451c337ef72e3985a50cf65aefb7e851d4f06a2cae1ef49d79e80f93cb77be229c7369de3720af25b181c919968d5f3ee55a07e994c3a79d5c4e2b767523eb145ad93f1fdedc21d9e49783fd27f3c9b4a18500b02484bd976f069e4c08fce5ddbbb23a8ac8c9c4287d29d0db498f7be9882d4b7552a3565895a78b0f5ccd5377ac108405a73dcd3a11ec91742827a5e1b25d403d99d5612478f6966b634d28c637424edead0c37410b5624879e9217ab9981c4ceccb90c5d8b6f2ade855b350b8762ddb7bf75d9e6c006bb170265e1eb23a0e82cb311a663c9841ed05924a6ce92e3f2067d5ce982f04ca6148f93de9a4e13b8a1352c106168d878b437b1ba98df6cb934814d00446436455888134d7a27f0169c61ed48877ea5a229023506cd113879d2cf8d6523bc461806488fab079599ff47538496271b2ce1a261b361d731765d669221e68f7d1a6f73bc3b0f9837370874546429d9803a0ef07a620d195894884c8b8cf867a0dd5fd962c02b5a3eeb4f21a3def347253f5502cc1f760cd73742c72142c953c59ec26f86d3eb89d0d35826b8fa1e6e8d3d0bc35258e455ee267bab5f7d6816633b1482b23baec372eca2a275574bf9cd2cded2cf7f941f2f38b6184e172b30ffcb49178fff2c02f4731819f17700236742d7104e2eacd806228658bad1f62e1586cd376603f5967b2041a9b5cb8f45128d51527124d6ce0cca31cd8060b0c70b9937fc879252d8d7a39d7c9603bc55039388acf7434a5c137485915b2d35a9e0018eecb698d1df81268d03b909fee324a66d791cce23f31f428c27aa8ee7bfd17e11e6fafb7c8d6296cd7a890189dd05909c3bc30d6a54a47aa5ffa29df9cee68684feb852b3d209b2b1265b702a624fb0612b5110f2b7cda8b976425304b4c8ee58eb901b4e5b66ef20d78ad8d015a1f115479361e836531ff326f2dad402f6012a33b72c1d85eafed6a0301d04c72cf1871d8f98096a75bd677b6c498fb9139df818624b691c3c7abe18cb947fb0e87aca95e4d366d8137888cf57beb1221ff8b6ff47e4005f355650203e1c067f14bbf230748eca3cd8ba0efea5ed0c9a9b4714ffe488c0604fd188fe769cb", 0x1000}, {&(0x7f0000004380)="667bd57ccadea3ba55b4cf27ffa8c6bbeba9b12e92e6dfd0ba138b2f1910f3dfee1d8015d5764b3832cfa50a28cef3fdacaed0ceb587206c7e3b153bae040885a325998a5945bea1bcb4eb78945fe134ae9244f10879254cb0717eceb25686498bf973", 0x63}], 0x6, &(0x7f00000046c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r16}}}, @cred={{0x1c, 0x1, 0x2, {r20, r25, r28}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r29, r31, 0xffffffffffffffff, r32, r0, r33, r35, r37, r39]}}, @rights={{0x38, 0x1, 0x1, [r40, r3, r42, r44, r46, r48, r50, r52, r54, r56]}}, @rights={{0x2c, 0x1, 0x1, [r57, r59, r61, r62, 0xffffffffffffffff, r64, r2]}}], 0x100, 0x20004000}], 0x3, 0x800) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r65) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r66 = socket$netlink(0x10, 0x3, 0x0) r67 = dup(0xffffffffffffffff) r68 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r68, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r68, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r69, 0x1, 0x1, 0x48}}, 0x20) r70 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r70, &(0x7f0000000080)={0x0, 0x34d, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="3000000010000108010000000100000000000000cb6a4c37c3c41bc019c505c17ea065cda44be210d714185b41b880a39aea7758a63433c7faae7c215380c5b94d281c15d79bf7d5674481f31f64116bd202a071cea4b7aed9c15722dab07d9e370f04903ad9efac00d52543686b7fcb7cea53a55b24390e6a90ad7d7366d39a7fdc9d7c19fea9af20fbcab96d2af28c899c09583e8be40b7ff643616c93a43eeefefae6e79ef22a0b018f822a85a3602d02484d16bc1643afd3e216489affc605081a1445737eac68534788cc63f21b8bb55ed773", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800290000000100"], 0x30}}, 0x0) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) fcntl$setown(r68, 0x8, r71) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000240)={0x9, 0x3, 0x8, 0x8000, 0x2}, 0x14) getsockname$packet(r67, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r66, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r72}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r73 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r73, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r73, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r74 = dup(r73) write$P9_RGETATTR(r74, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$KDSETMODE(r74, 0x4b3a, 0x0) [ 1897.196640][ T9870] bridge1172: port 1(bridge_slave_0) entered blocking state [ 1897.218163][ T9870] bridge1172: port 1(bridge_slave_0) entered disabled state [ 1897.233915][ T9870] device bridge_slave_0 entered promiscuous mode 18:12:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x30, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) [ 1897.255307][ T9870] bridge1172: port 1(bridge_slave_0) entered blocking state [ 1897.262679][ T9870] bridge1172: port 1(bridge_slave_0) entered forwarding state [ 1897.284139][ T9922] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1897.447222][ T9955] device bridge1415 entered promiscuous mode [ 1897.497099][ T9956] device bridge_slave_0 left promiscuous mode [ 1897.515263][ T9956] bridge1414: port 1(bridge_slave_0) entered disabled state [ 1897.586518][ T9956] bridge1415: port 1(bridge_slave_0) entered blocking state [ 1897.610622][ T9956] bridge1415: port 1(bridge_slave_0) entered disabled state [ 1897.622252][ T9956] device bridge_slave_0 entered promiscuous mode [ 1897.646319][ T9956] bridge1415: port 1(bridge_slave_0) entered blocking state [ 1897.653776][ T9956] bridge1415: port 1(bridge_slave_0) entered forwarding state [ 1897.750513][ T9960] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1897.759869][ T9960] device bridge1415 left promiscuous mode [ 1897.783560][ T9963] device bridge11 entered promiscuous mode [ 1897.805806][ T9922] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x960f0000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x30, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) 18:12:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccca, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:48 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0f45bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1897.896399][T10083] device bridge1415 entered promiscuous mode [ 1897.915229][ T9957] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1897.939411][ T9957] device bridge1415 left promiscuous mode [ 1897.984359][T10077] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 18:12:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xc3ffffff00000000) 18:12:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x7c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x30, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x7c}}, 0x0) 18:12:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$getown(0xffffffffffffffff, 0x9) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) lstat(&(0x7f0000004480)='./file0\x00', &(0x7f00000044c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000004540)=0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r13, 0x0) r14 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r15, r16) r17 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r17, 0x36) r18 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r18, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r18, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r18, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_FIOGETOWN(r18, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f00000005c0)=0xc) r21 = open$dir(&(0x7f0000000240)='./file0\x00', 0x10000, 0x83b2f476773c9c96) r22 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r22, 0x40086602, &(0x7f0000000000)) write$cgroup_type(r22, &(0x7f00000002c0)='threaded\x00', 0x10211) fallocate(r22, 0x3, 0xc000, 0x80000003) r23 = socket$inet6(0xa, 0xa, 0x8c) bind$inet6(r23, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r23, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r23, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r22, 0x89e2, &(0x7f00000004c0)={r23}) kcmp(r19, r20, 0x4, r21, r24) newfstatat(0xffffffffffffff9c, &(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r26 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r27, r28) r29 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r29, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r29, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r30, 0x1, 0x1, 0x48}}, 0x20) r31 = eventfd(0x8) r32 = socket$alg(0x26, 0x5, 0x0) r33 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r33, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r33, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r34, 0x1, 0x1, 0x48}}, 0x20) r35 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r35, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r35, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r36, 0x1, 0x1, 0x48}}, 0x20) r37 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r37, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r37, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r38, 0x1, 0x1, 0x48}}, 0x20) r39 = syz_open_dev$vivid(&(0x7f0000004640)='/dev/video#\x00', 0x1, 0x2) r40 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r40, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r40, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r41, 0x1, 0x1, 0x48}}, 0x20) r42 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r42, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r42, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r43, 0x1, 0x1, 0x48}}, 0x20) r44 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r44, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r44, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r45, 0x1, 0x1, 0x48}}, 0x20) r46 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r46, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r46, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r47, 0x1, 0x1, 0x48}}, 0x20) r48 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r48, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r48, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r49, 0x1, 0x1, 0x48}}, 0x20) r50 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r50, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r50, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r51, 0x1, 0x1, 0x48}}, 0x20) r52 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r52, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r52, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r53, 0x1, 0x1, 0x48}}, 0x20) r54 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r54, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r54, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r55, 0x1, 0x1, 0x48}}, 0x20) r56 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000004680)='/dev/video1\x00', 0x2, 0x0) r57 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r57, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r57, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r58, 0x1, 0x1, 0x48}}, 0x20) r59 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r59, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r59, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r60, 0x1, 0x1, 0x48}}, 0x20) r61 = inotify_init() r62 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r62, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r62, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r63, 0x1, 0x1, 0x48}}, 0x20) r64 = ioctl$TIOCGPTPEER(r5, 0x5441, 0x2) sendmmsg$unix(r2, &(0x7f00000047c0)=[{&(0x7f0000000180)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000000340)="78039e8050d28d0aad407267a22f511db378befe721e21dbcc0d6a9648021de8b5686ce9d133d736984767c6a5fe2304cea1af2094238ac42ba0f1f04193c0ef4de015c613e8ced24c765a09ec1c4930a8de354bd7579880d79c6f35e3b2f58d161850f8f79b40f9540bbd0fb4ed7eb70f7ee594ce7013ce6aad8daac08e1c61c10d705056c1e66ecd27f7c5bf1baa0e0615a36be85f299dac16d4", 0x9b}, {&(0x7f0000000600)="8455539b5e389eb75909f35d0221e2197eec1376e12bf6deb58ec1dd7c2b81c4258b0c4b1de8c2591cab3094362dfbb069201308c2e66d191da9a562a6a2eaa00449d3540fb415bb80ddfe017cb3f9a88ca1dec7f91492640172c57c4155bf0d98f50149a1fe39722864b4cba806ef8b09d5299b49f86b854524e4fec2310a41b99331700a120402a2878b84631a69711be86f4f050d2e667a67dd888647227ad67699ffaa800b5893a4057a34a9b7d166cf2c12ecb95328f228a1104d8ac8a3e24ef30555ec0f5da35683f18015c79e4098a57c90ee5a5de38cb8b02cc1d3fbb0fe908a5ee89bc0ed1085b2ba", 0xed}], 0x3, 0x0, 0x0, 0x4}, {&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000700)="4a339aca551c70459790adf9182751ae568b", 0x12}, {&(0x7f0000001b40)="da88faf29be8f100215826b2d6d0e97bdd1dabc44ce4907ed535b07c20cec43242daba580867cb490d1cb945673625de57407122fdc7969d7c8528b2c5ced787d76a2786bace10fcc1590474b829ddebc205fd8ae329f33dba20c7e2b36c389d73cfcb83b6ebb5b84cf1a9800731a05d616b19f6b9ac6cccafaa8efde72650a8b63ba30db338a4d55de2d4e4f2f9acbc70652d4f135a1c5e7a7494a5ae6d2f36cb4dc440a3ae6cdfd3cb933d8ce0339f681377f0ba1ac095c6b204c80a30387064ee87c918e487f5011166622132937cd31f76d2c0f7007e9f3fabf20b268518b076", 0xe2}, {&(0x7f0000000740)="f40a98daeb3693df77f52c7fb6f478c7547eee0effb6e9a1cc1aa2f28ba62949853a0f30774aa6f1cb9cdfed9897aee01aa0017e07edf422e99e54286ac86b526946518c4686063d073d915a3a9f7a74b375d25fb087a1a490d3d2f42b1d670f811de939dabdc6691fd8cae4d98c0a9f39ba2472a285fa526db79fc93e317f4e08b50088d8088a3bd0186931aafcc7341f0cc9c00ed7169924db45bf070e03", 0x9f}, {&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="3adbd96a3eeb54eb3383ed094a078f98f66f92a854bc865102cfca9407dddfd1158d0c1af051eff29c8f4c45a6bcdeb26cc9a8ed6ca4b021421f041ff87a3b65e94144b4fc5df0d7c9901de454f20819e7002a821951df235e90e77b5440fa7f937e47e1035a64abd97bbaa8ee0622dc17ada95f07a51b003c32750f6d43ab1b9dc8fad1c7", 0x85}, {&(0x7f0000002d00)="ceeea5e026b5a3c93f2f8317064900aca0c1640a8706f6dfb1745cfa3a4e771a9c29544e5b66a5345c12677424d4b8cf1195e25b6ae5e9781c815db8a0db3f9eebcbd34fab6720d610ab81b20a4880a57c20445637cf287b80b57dd49674b73e8a134858d05fdee835b3c0651c73aeba910a3659079999a2f3488d90df2cb5bcb57fae01d9b1888a0e0ed37e648a94394bcc6af584d51227fb7809841d6651de3c67bae833537f9dafad5618765eb6296451db9fb0835f9c21e686e59146fd524a36f03552c2", 0xc6}, {&(0x7f0000002e00)="85e989680a1bb9bea087edc5fea6f2ac11bd2705cf14e9f275a9e8ce5ee615e74e0cc21180e8f153de409ed3dbff29aa4c86118c77e58e3b40dd8b57e4a4b0337705bdcd2fe31105f837c22d68a1302d77035828d7da1386184e71970c0f40c6f57f5017f3dd1b94fb7c5370de4477dd345d48270fa1a105e338e89a67ddf75e7c5ab93333670c9dd7dcc038692c0915c2669be2885649c593fee07564ddbab2cac4b325e0efda0f6343277f7576e183162b3f77c0175c84b9022b8963a10fdce6a4dc083cbf79d4", 0xc8}, {&(0x7f0000002f00)="1cd11af5b21797dc557e8186cff0870033c79e0418e58270ccbce5e41386639f70530cedd2857c4e6a378fd0e67d5ea2143d3c5d9d213aa4eac08b08de349ac5d94d47ebd3a2ef2775bdf64e3cabaad2f555969d613eb912e48c2017b9bc09b0c5ae30fca3f468fd14007284809f24e65bb28e6cf35339f3b63d9827ae4060d505934a8ef1772c011abd06ada222dc8bb43682893158fa1ca908fb38a36d94a3b1928ba3bf0dd682aa7c9f", 0xab}], 0x8, 0x0, 0x0, 0x4000}, {&(0x7f0000003040)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000004400)=[{&(0x7f00000030c0)="7bc0594d2212e6fa35fa42b80375dc336c3899da6ce5e335f70a2a9e86e76c438e2e0ec4ff029cfa8c0363b19f8d24a9d3f4ea8b4f13309029f166156c1072dcbd913a9e45b747dbaa44a74dc9133da82aa033c9a125d623fda71347bfcf5c421eba96ba19e583fb6ff75bde34ff4f3b41a093eb98c118f221da1dd6663baddf2fa5", 0x82}, {&(0x7f0000003180)="d0a07d40878c36747761d856faa72054b109f6411ba6a12ea7", 0x19}, {&(0x7f00000031c0)="156ac3d778366b5d7e74a53c04444bdfa9fa0cdf5cca2ad7d65c3ed56aba4eaf527a39cb39b38fe25e9e75b397b68b1213da01950c3677c44d2910a2895b282e9aee8000ebbef2eead4d56630297a872f2cbd0e802926ef295d7ed774659bd65a9ab9820ddd3d24b1eb0064a8ad1f6b5f2c5161b51f6f7ff2d3104e56c170c60e33bf10343bff6bb10589b3592f6ad0984ae", 0x92}, {&(0x7f0000003280)="dfb88f8780b7227dd29b87085133b25fb5d1950c294fafd3ee6a3b3aecf4d2781e547882216885333f46bdec07cfac297c1fe991a6f3bd24ad16f4e97e49dff9d45d0ad23a835da97631be58ccd36359d97476dbdc4860c9ddbdbc164a07ba569019523ea538534591568a6d918476d23290c632a2a6d4f5460c957798db8f945d1a7ee3e213168f10321e6526497617eb9a115434ff5212a718ebd18c1e248bc5bc6d17f9634e01dfa15eb4030176520385b36ff7fb05f720f88a6d5401648c0cd6abaab6fd1b1132934b665ac9e4e87517ef91babe492ad4c5b0b8e29f4e5d76fb818b7f860cddd45fe82d1fc730d958a4", 0xf2}, {&(0x7f0000003380)="bdb91ceea03db9de579b0b3ff79a29a4fc4cc81d9a6c175a30095992964fde2bea11b5372fc00d9bb721f66e92a511ffcf7bf556692b94870e07b872544fbb3a24dd6166ac7f57c773b48f5e732a132f2cda29683c4502ae7d4b7cf461616e84da1082534925a9e31ce693ea0266dcf04959d2a69b4ef7b48fbe02313a5ef98b6f4b90eebcf7be3732a94df63037d9796276303765c62b31b2c0128fcc12dac2161266cb52d3b250bf0a8f090d752f2b9a3bfff2d7bd1683a6efc4080644f94d6ddbafda359b06d557b3804944a0591026a30d73b20df5302c799bf769552050f302605c113d46733925ae134ced4cd08f29047883182bf2aed902ec58591f00321ec268e773c22fb4d466501cf1c332ad4615451d3b2b39de435afd2da5e77f07fee470908c38e842339cc7842c27cca3306a729cd86ca6bb94f4c8b9b156184a594deb0c5cf1aaa260feb0728280c02090f46ec790ba49cab773861a8382af65bfd1d672c1f3618a702b3483e8e226a657e31eda5177dc967b9c657f0f902ca01d483de1d53aec8707dd56aabd7f6111a28bd6aba9fe8ee35c256ce0c2decd368624472c4e457511ac95709a9f4d5d20c0889789aa9f85b319e4047fe852778b6418bdafed081e3efc7fde5a44ea31a0b26c0664a22d8a4c2ae6110f7743ffe51be9190929a6d0bfc0d6b6764d3734668312927a76638fe951104924a1224b22a2d01c6455a54a16399ebf5a7052834f34fd63c79c76c4a506d7ec038ce9bf38a4660dcf8a902d9e6b4f30a9d85ce59a183077bcf7e701cc2ba9b4b716e7e615cd05302355bb0bf4190af0494530dd24282dacd33a7bb8db7bb8a24a948d3d7a3c7f95ab806e12e4d5f66b2043287efc2ddd6c43891b246ae402c2846114cc375b8e13dee8ed2efd8cea2e0b910f5fa89574b269765c49f33f7a31a565f8a33f720837550370714273bb9996f3f10aa85fee618c2efcc2c18da0f6d20823276ea213d2bc338dbc6c4603e76a5cd99cd15e0ab30ba6a297dc402eba3d54cf597d31a029fd23da603499211748e9f0a57616534edf345b5890d250a3c8510f4e47cc4e64662cc7239a795a1dbe53ccbc872294a7da7bd94b39db42a50354bdbf5efe0e32ffce71ce78264f1c8c5c9d0f634518181bc5bbbda63963b986c9284fe7fb7542b5026a21267a3ef6a203e6760f194688484e4769e4f7066349694563fbe691142096692f8c42cbd5930ec73a848f829dd1d7b94d563fd3231008c22f7de09e6df87b715e5807ac87efab2db7fda1ce2beb4a8ea9c3f254a4df62a95ab8f581800e5a20ffaaf1f0edb32626193434e0d0c7104c3a29b6fad51d19a356ca793660227f8f8733edc224dfb42fca7f52c0ee24330f233708ac83f6fa8979b9199cec884692299fb997d878bcb6e0fb08074cd2fcb1bebc590601d927b6262c9b5d7f9c24aa6c042643ea4316ae2f0ed063d80f06b27a3c7e7dda0611cb58219fdf4395e2991748b9ba9de9ed865e72cb0573d52c58bdf85e375f93cf5c822a4c5e2142c2957b7d7defd907bdfe8fd3fa8ef0b91991547237c46397c44f0918df36aadeee985ea383b660d39cec9498f84a59b1965b0f36642ecf617cceffdeea9c5127610458b8a6707cfb6ced5d48ad585a65e07d3e8a01bb639dd691428502d2f181a75683c2cee29ee9103fcd82e6a254ba8a12fb7b63933a814064a056b4ca8c51362331101f211a1945989f84a7e679ea3ea4fa6b36b04685f38166260d659fd611620db02236b7140659310f2dcc0562e59086691aea3d3e7060f65304405d4f426ef43278f39cf5cb325e861bfceaad99e76bf9a51c15f3673d1dd122a2200c9dc21ec14065e836dfad9db62c52ebea377a76587773f7f2b947038f13f40397b08c8d571a7680488375d2997e9b3e569d1a264dce21b82a160b455b225ff41d803c2bcdcc5582b76381d62bad871026b73ad239e628b9b4915c4b93a62b49272265d3358680ba2bfe8b3145f703b817e31eaa911b60f64624bcd459bdef0d5dcf01a4b9c9f75d67844da15ccb8b1b40c8103b7ac8312c072e733ab413fbc2eb24ba9f3d47382749487ae82fd8519b630b837970e3433122dc7515802314dff45c9cfc0117bea0f2b3ab7f08f43951ea65ba25ff04c61619be60122690aeda5f83e53a7759079e636489952a34d5086e9c7d97aa2c4d10b69822fcd8bc7c1e693d201b58bbc9fcca2231bc6f9210c7531cc1fa266ec35ce2bf5866b75219db327c61192fef4febb4a999430b9760c7ff496e49e65d1b4fa7feaaa26df6fd386300091f4d90b964ced9461a15bffa6efacffb79aa4ba65b9483bba2750bf01cf3bfce828bf38412a73af0ce17991a017680e05e326ce5138a8781b67da318457aac5e9c2880f567b344b38fcfe7ada827ee2473db7d2c8e21b68d668092766909d926b4be302805c8f4c30b33fe6cac584633f0036b169aa4174859d3cc2a79fd67633b20e0603f9d103abec2d97d7abf729a26fdbc7b5b7684f53182dae6baf840e87df3e2a3af27598ce2f8c9e56965727f619d0b9488dfc805e049f5c0263e91cd8db6cb4667564e38a6a3be36665c0d378c5109024fef4c8958cad432e7d9b529711c5d25d8623cf1689483577bc1c202ca341a2c8e5c159fed484bf5b0096d3da0c1d9f9101ad95d31bd6ae1abd14b6b03c569a6accc0cf6173cb8df060bbdedbdb90f33dd3b412172cec8f6db546d3527f9feea76cbee3d80e20c9cb1b1030d3778a8ed2d97ff5a1a3419e26ee395d3ab6b49391f7dbf890fb12edccb29631af24031ffe4f2a28db91307a39c2043ab609ae7eadd97244057b25e4894cebe196977842641982f488d51d785415c1c12f45780d6a6635ae5937cb2e7db49c01653eff519e2e0c42552fc0df52683097c6345250eaade9a9340f6f48bd08d1f11bca8d632ddd159b134b89b902331c20b3d70fafd6943cc64b9c9b89e2bc3f90a38a40fa9f4029bcb914d04251c4c94db2976e2733f96c24f18f8435eb7ffa6fd7a243bb990f2e6aaca211d53634c8604e8cc0feab0a93cd536ee39894be8f267c4bf8e6571cffec966aa4c7f3322ccb7142b7d6c169d93a8d8c4e8a42857b587651649ea9f1f6431491842d39bfa204df39493f8942c42a2c8113251466eedb5203c24ad07f9c4d99fcfac9cd69a24dcc43de78c9368ae4503c40424965cefc636531ef9911888f357f1cd60be14af1c4cd65c98b0c91ae6c631691dffeebab93a754ce88aea17e9b47a2a5b0ec96e33f2d11c843b996d2aa6e57277ffffaabd3a936e2bd69fa2a6c63e63a0e416c1101528bf70d6f41ab38501e2148e8b94fe2b1ed0399b797d8a269247325d9d5e2007f41f6b1f79f8cc4d6b33bf1e5d3511cf0c19919b9823a548e1ddacc3297e079b85b9c49858f8c6f4bfe14392f41913bbb3137640ffe1e379f524a0e5581f7eb9cdc2dd55be5856943adc3458e94c3ed3715055ce538ffc3d5c1c6465eb5a80bb8043d746b4bf5179950df2dc0838c00ecd8ea3136e8a735f32f2dd2391daf07a8ae3d17a14f0db1657aeb3a89388e296d471c4c7d5892014cbbadf78049216c0353e95c47f5608d5648d7e11c221e794f4c38a2fb023341bdf14d80195c1662483ae6c654a74269be256f58471e4607423d00176de26263eae880f9843ab0a58217d4cc2fbdffa592586f76fa2302a879a4e0009063ca8055c862471aa9d8955acf4779cf55e1106d979227c1eb4b210fd0e024ce49e4ac85b605a4227d99857f51ac470352c639b3c6cad3ae33b3bb071b89695f20a2c7f9050057554005684b5b07cba0c639bad31935064df635723c976b6e0f08ae9a39860f881ecc576b4b6e590ec91a2a7f480bad3630ce8d5a4f739d4ca2d5f897297e8703e630d208d1eb83f4d5044c06299bb3dc515f89eb009f055a078dd568663d7e2d6754b9c0d134088625b7d62e5fc70e3372d8cf72d0a1fddb428b19f2018372879310f157c27ed58b77252eb454d305a47ee4ae2a24931b665292313f5487f2d8fa94ea99e5bb06469242329eb43d21f6b870ae15e761a0f644aee37eb2685450b1fbe7c00e432ffca23ed02d96f7a86122b64d7fea2947f62b4df128c303487ecea52a6832d81499bb90f442f3bd2605aede4132cc520f16312dcf3a1fedc50c4fbf351636fe18e8bb0a68f2e61a4de900a522b7455ee4bf637978a2df563f1edc2ff6a4c42349630d8bdd755d7577f56b6fe9482ce4880280f36ea89d12d7efce114835b5dbbd12dc2f3534854db7b655777c8d4a094f93e2f33bdb6873aa196e494b16c72e74613f9ce729162972fcc23b31f0d5e680fdbf157babe0160d6cf92ae477771e26692747a2b342d0a1431b1f21ee30bcb00c641e6b21e382b53eb21dfc46c861aabca5605396ba4fb27c1178be47d1020783af34538f5a6224a24fd9eca179c0cdf8eba53c49c78a597072c065271c36e62b0ed5708e2ed477b1cd491895aad0efac9d6da7af5e325b9f9d04ac6c9542ef728c2e04df2b84b6aa306f73d35a912e3ec430c361827f54cf3f4267aebb270ea95c858abecb58615892d93a8d869cc8b4154499d63a717df0fa17510675a45817bce228633b6329aa62f4f55899c92b8b65572d127f57f6861371dc5f513f451c337ef72e3985a50cf65aefb7e851d4f06a2cae1ef49d79e80f93cb77be229c7369de3720af25b181c919968d5f3ee55a07e994c3a79d5c4e2b767523eb145ad93f1fdedc21d9e49783fd27f3c9b4a18500b02484bd976f069e4c08fce5ddbbb23a8ac8c9c4287d29d0db498f7be9882d4b7552a3565895a78b0f5ccd5377ac108405a73dcd3a11ec91742827a5e1b25d403d99d5612478f6966b634d28c637424edead0c37410b5624879e9217ab9981c4ceccb90c5d8b6f2ade855b350b8762ddb7bf75d9e6c006bb170265e1eb23a0e82cb311a663c9841ed05924a6ce92e3f2067d5ce982f04ca6148f93de9a4e13b8a1352c106168d878b437b1ba98df6cb934814d00446436455888134d7a27f0169c61ed48877ea5a229023506cd113879d2cf8d6523bc461806488fab079599ff47538496271b2ce1a261b361d731765d669221e68f7d1a6f73bc3b0f9837370874546429d9803a0ef07a620d195894884c8b8cf867a0dd5fd962c02b5a3eeb4f21a3def347253f5502cc1f760cd73742c72142c953c59ec26f86d3eb89d0d35826b8fa1e6e8d3d0bc35258e455ee267bab5f7d6816633b1482b23baec372eca2a275574bf9cd2cded2cf7f941f2f38b6184e172b30ffcb49178fff2c02f4731819f17700236742d7104e2eacd806228658bad1f62e1586cd376603f5967b2041a9b5cb8f45128d51527124d6ce0cca31cd8060b0c70b9937fc879252d8d7a39d7c9603bc55039388acf7434a5c137485915b2d35a9e0018eecb698d1df81268d03b909fee324a66d791cce23f31f428c27aa8ee7bfd17e11e6fafb7c8d6296cd7a890189dd05909c3bc30d6a54a47aa5ffa29df9cee68684feb852b3d209b2b1265b702a624fb0612b5110f2b7cda8b976425304b4c8ee58eb901b4e5b66ef20d78ad8d015a1f115479361e836531ff326f2dad402f6012a33b72c1d85eafed6a0301d04c72cf1871d8f98096a75bd677b6c498fb9139df818624b691c3c7abe18cb947fb0e87aca95e4d366d8137888cf57beb1221ff8b6ff47e4005f355650203e1c067f14bbf230748eca3cd8ba0efea5ed0c9a9b4714ffe488c0604fd188fe769cb", 0x1000}, {&(0x7f0000004380)="667bd57ccadea3ba55b4cf27ffa8c6bbeba9b12e92e6dfd0ba138b2f1910f3dfee1d8015d5764b3832cfa50a28cef3fdacaed0ceb587206c7e3b153bae040885a325998a5945bea1bcb4eb78945fe134ae9244f10879254cb0717eceb25686498bf973", 0x63}], 0x6, &(0x7f00000046c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r16}}}, @cred={{0x1c, 0x1, 0x2, {r20, r25, r28}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r29, r31, 0xffffffffffffffff, r32, r0, r33, r35, r37, r39]}}, @rights={{0x38, 0x1, 0x1, [r40, r3, r42, r44, r46, r48, r50, r52, r54, r56]}}, @rights={{0x2c, 0x1, 0x1, [r57, r59, r61, r62, 0xffffffffffffffff, r64, r2]}}], 0x100, 0x20004000}], 0x3, 0x800) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r65) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r66 = socket$netlink(0x10, 0x3, 0x0) r67 = dup(0xffffffffffffffff) r68 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r68, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r68, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x2b}], r69, 0x1, 0x1, 0x48}}, 0x20) r70 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r70, &(0x7f0000000080)={0x0, 0x34d, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="3000000010000108010000000100000000000000cb6a4c37c3c41bc019c505c17ea065cda44be210d714185b41b880a39aea7758a63433c7faae7c215380c5b94d281c15d79bf7d5674481f31f64116bd202a071cea4b7aed9c15722dab07d9e370f04903ad9efac00d52543686b7fcb7cea53a55b24390e6a90ad7d7366d39a7fdc9d7c19fea9af20fbcab96d2af28c899c09583e8be40b7ff643616c93a43eeefefae6e79ef22a0b018f822a85a3602d02484d16bc1643afd3e216489affc605081a1445737eac68534788cc63f21b8bb55ed773", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800290000000100"], 0x30}}, 0x0) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) fcntl$setown(r68, 0x8, r71) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000240)={0x9, 0x3, 0x8, 0x8000, 0x2}, 0x14) getsockname$packet(r67, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r66, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r72}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r73 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r73, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r73, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r74 = dup(r73) write$P9_RGETATTR(r74, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$KDSETMODE(r74, 0x4b3a, 0x0) [ 1898.106858][T10108] device bridge12 entered promiscuous mode 18:12:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x5c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x5c}}, 0x0) 18:12:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccb7, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1898.266556][T10111] device bridge1173 entered promiscuous mode 18:12:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x5c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x5c}}, 0x0) [ 1898.438677][T10219] device bridge_slave_0 left promiscuous mode [ 1898.479312][T10219] bridge1172: port 1(bridge_slave_0) entered disabled state 18:12:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x5c, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x10, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0xc, 0x16, [0x0, 0x0]}]}, 0x5c}}, 0x0) [ 1898.576499][T10219] bridge1173: port 1(bridge_slave_0) entered blocking state [ 1898.608154][T10219] bridge1173: port 1(bridge_slave_0) entered disabled state [ 1898.622976][T10219] device bridge_slave_0 entered promiscuous mode [ 1898.650878][T10219] bridge1173: port 1(bridge_slave_0) entered blocking state [ 1898.658310][T10219] bridge1173: port 1(bridge_slave_0) entered forwarding state [ 1898.718926][T10215] device bridge1416 entered promiscuous mode [ 1898.737996][T10221] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1898.753974][T10222] device bridge_slave_0 left promiscuous mode [ 1898.760468][T10222] bridge1415: port 1(bridge_slave_0) entered disabled state [ 1898.796487][T10222] bridge1416: port 1(bridge_slave_0) entered blocking state [ 1898.808168][T10222] bridge1416: port 1(bridge_slave_0) entered disabled state 18:12:49 executing program 3: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6cc2b5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1898.841508][T10222] device bridge_slave_0 entered promiscuous mode [ 1898.879827][T10222] bridge1416: port 1(bridge_slave_0) entered blocking state [ 1898.887267][T10222] bridge1416: port 1(bridge_slave_0) entered forwarding state [ 1898.931017][T10229] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1898.960744][T10229] device bridge1416 left promiscuous mode [ 1898.993790][T10232] device bridge13 entered promiscuous mode [ 1899.032705][T10221] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x96cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccb5, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccb7, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1899.103871][T10222] device bridge1416 entered promiscuous mode [ 1899.143310][T10215] device bridge_slave_0 left promiscuous mode 18:12:49 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d1045bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1899.192371][T10215] bridge1416: port 1(bridge_slave_0) entered disabled state [ 1899.298227][T10229] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1899.345018][T10461] device bridge94 entered promiscuous mode [ 1899.371948][T10466] device bridge_slave_0 left promiscuous mode 18:12:49 executing program 3: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6cc2b5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xda3ea0b800000000) [ 1899.390595][T10466] bridge93: port 1(bridge_slave_0) entered disabled state [ 1899.468200][T10466] bridge94: port 1(bridge_slave_0) entered blocking state [ 1899.502620][T10466] bridge94: port 1(bridge_slave_0) entered disabled state [ 1899.515648][T10466] device bridge_slave_0 entered promiscuous mode [ 1899.535861][T10468] device bridge14 entered promiscuous mode 18:12:50 executing program 4: lstat(0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) dup(r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000440)='./file0\x00', 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, 0x0) pipe(0x0) r4 = syz_open_procfs(0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={0x0, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_LOCK(r5, 0x4008642a, &(0x7f0000000300)={0x0, 0x17}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r6, r7, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, 0x0) r8 = open(0x0, 0x141042, 0x0) fadvise64(r8, 0x9, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) socket$netlink(0x10, 0x3, 0x0) 18:12:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3ccb7, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1899.601548][T10467] device bridge1174 entered promiscuous mode [ 1899.644344][T10520] device bridge_slave_0 left promiscuous mode [ 1899.653720][T10520] bridge1173: port 1(bridge_slave_0) entered disabled state [ 1899.727450][T10520] bridge1174: port 1(bridge_slave_0) entered blocking state [ 1899.778796][T10520] bridge1174: port 1(bridge_slave_0) entered disabled state [ 1899.798806][T10520] device bridge_slave_0 entered promiscuous mode [ 1899.832660][T10520] bridge1174: port 1(bridge_slave_0) entered blocking state [ 1899.839995][T10520] bridge1174: port 1(bridge_slave_0) entered forwarding state [ 1899.873358][ T27] audit: type=1804 audit(1579284770.345:20288): pid=10692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir407591635/syzkaller.tpzf6F/2529/file0" dev="sda1" ino=17428 res=1 18:12:50 executing program 4: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x1, 0x7, 0x3}) [ 1899.948147][T10581] device bridge1418 entered promiscuous mode [ 1900.016812][T10582] bridge1418: port 1(bridge_slave_0) entered blocking state [ 1900.049293][T10582] bridge1418: port 1(bridge_slave_0) entered disabled state 18:12:50 executing program 3: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6cc2b5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1900.064867][T10582] device bridge_slave_0 entered promiscuous mode [ 1900.079758][T10582] bridge1418: port 1(bridge_slave_0) entered blocking state [ 1900.087060][T10582] bridge1418: port 1(bridge_slave_0) entered forwarding state [ 1900.127720][T10799] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted [ 1900.163186][T10685] device bridge1418 left promiscuous mode 18:12:50 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./buX,workdir=./file1,upperdir=./file0']) 18:12:50 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d3a45bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1900.213444][T10695] device bridge15 entered promiscuous mode 18:12:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x97cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x800000000000000) [ 1900.335454][T10581] device bridge1418 entered promiscuous mode [ 1900.409279][T10685] device bridge1418 left promiscuous mode 18:12:51 executing program 3: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}) 18:12:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xf0ffffff00000000) [ 1900.586612][T10909] overlayfs: failed to resolve './buX': -2 [ 1900.607836][T10914] device bridge1175 entered promiscuous mode [ 1900.658721][T10919] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted 18:12:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x86dd) 18:12:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc96, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:51 executing program 1: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x68000000}) [ 1900.704287][T10916] device bridge_slave_0 left promiscuous mode [ 1900.723068][T10916] bridge1174: port 1(bridge_slave_0) entered disabled state [ 1900.815747][T10916] bridge1175: port 1(bridge_slave_0) entered blocking state [ 1900.873118][T10928] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted [ 1900.878424][T10916] bridge1175: port 1(bridge_slave_0) entered disabled state [ 1900.908924][T10916] device bridge_slave_0 entered promiscuous mode 18:12:51 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x40000000, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1900.937374][T10916] bridge1175: port 1(bridge_slave_0) entered blocking state [ 1900.944959][T10916] bridge1175: port 1(bridge_slave_0) entered forwarding state 18:12:51 executing program 4: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x4800}) [ 1901.106170][T10924] device bridge1419 entered promiscuous mode [ 1901.194239][T11046] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted [ 1901.221402][T10925] device bridge_slave_0 left promiscuous mode [ 1901.241417][T10925] bridge1418: port 1(bridge_slave_0) entered disabled state 18:12:51 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x10000000, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:12:51 executing program 1: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x0, 0x500}) [ 1901.326046][T10925] bridge1419: port 1(bridge_slave_0) entered blocking state [ 1901.376138][T10925] bridge1419: port 1(bridge_slave_0) entered disabled state [ 1901.426744][T10925] device bridge_slave_0 entered promiscuous mode [ 1901.473810][T10925] bridge1419: port 1(bridge_slave_0) entered blocking state [ 1901.481204][T10925] bridge1419: port 1(bridge_slave_0) entered forwarding state [ 1901.494699][T11056] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted [ 1901.536450][T10935] device bridge1419 left promiscuous mode [ 1901.578716][T10938] device bridge25 entered promiscuous mode [ 1901.613758][T10922] validate_nla: 7 callbacks suppressed [ 1901.613768][T10922] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:52 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0709bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x98cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:52 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x4000, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:12:52 executing program 1: lstat(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40086607, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0x68000000}) [ 1901.687288][T10924] device bridge1419 entered promiscuous mode [ 1901.725533][T10935] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1901.738528][T10935] device bridge1419 left promiscuous mode 18:12:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfcffffff00000000) 18:12:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc96, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1901.784488][T11063] EXT4-fs warning (device sda1): ext4_group_extend:1748: can't shrink FS - resize aborted 18:12:52 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x500, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 18:12:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc76, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1902.004081][T11071] device bridge1176 entered promiscuous mode [ 1902.091455][T11075] device bridge26 entered promiscuous mode 18:12:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc96, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1902.185014][T11076] device bridge1420 entered promiscuous mode 18:12:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc73, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1902.236107][T11103] device bridge_slave_0 left promiscuous mode [ 1902.288307][T11103] bridge1175: port 1(bridge_slave_0) entered disabled state [ 1902.356846][T11103] bridge1176: port 1(bridge_slave_0) entered blocking state [ 1902.427995][T11103] bridge1176: port 1(bridge_slave_0) entered disabled state [ 1902.455085][T11103] device bridge_slave_0 entered promiscuous mode [ 1902.473313][T11103] bridge1176: port 1(bridge_slave_0) entered blocking state [ 1902.480693][T11103] bridge1176: port 1(bridge_slave_0) entered forwarding state [ 1902.505236][T11156] device bridge_slave_0 left promiscuous mode [ 1902.518257][T11156] bridge1419: port 1(bridge_slave_0) entered disabled state [ 1902.565437][T11156] bridge1420: port 1(bridge_slave_0) entered blocking state [ 1902.588252][T11156] bridge1420: port 1(bridge_slave_0) entered disabled state [ 1902.622575][T11156] device bridge_slave_0 entered promiscuous mode [ 1902.634011][T11156] bridge1420: port 1(bridge_slave_0) entered blocking state [ 1902.641351][T11156] bridge1420: port 1(bridge_slave_0) entered forwarding state [ 1902.662517][T11183] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc76, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1902.696634][T11180] device bridge16 entered promiscuous mode [ 1902.705132][T11184] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1902.716622][T11184] device bridge1420 left promiscuous mode [ 1902.743745][T11292] device bridge27 entered promiscuous mode [ 1902.762081][T11294] device bridge95 entered promiscuous mode [ 1902.781497][T11397] device bridge_slave_0 left promiscuous mode 18:12:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffe}, 0x0) [ 1902.823865][T11397] bridge94: port 1(bridge_slave_0) entered disabled state [ 1902.884976][T11397] bridge95: port 1(bridge_slave_0) entered blocking state [ 1902.893015][T11397] bridge95: port 1(bridge_slave_0) entered disabled state [ 1902.904790][T11397] device bridge_slave_0 entered promiscuous mode [ 1902.914799][T11399] netlink: 'syz-executor.4': attribute type 25 has an invalid length. 18:12:53 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0725bbb40e088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1903.020914][T11183] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1903.044047][T11076] device bridge1420 entered promiscuous mode 18:12:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x99cc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffc}, 0x0) [ 1903.076803][T11184] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1903.093579][T11184] device bridge1420 left promiscuous mode [ 1903.128008][T11403] device bridge17 entered promiscuous mode [ 1903.171201][T11406] device bridge28 entered promiscuous mode 18:12:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xfeffffff00000000) 18:12:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x3cc76, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1903.245250][T11612] device bridge96 entered promiscuous mode 18:12:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffe}, 0x0) [ 1903.291797][T11617] device bridge_slave_0 left promiscuous mode [ 1903.410970][T11617] bridge95: port 1(bridge_slave_0) entered disabled state [ 1903.463320][T11617] bridge96: port 1(bridge_slave_0) entered blocking state [ 1903.481444][T11617] bridge96: port 1(bridge_slave_0) entered disabled state [ 1903.490625][T11617] device bridge_slave_0 entered promiscuous mode [ 1903.534879][T11616] device bridge1177 entered promiscuous mode [ 1903.581169][T11618] device bridge_slave_0 left promiscuous mode [ 1903.587365][T11618] bridge1176: port 1(bridge_slave_0) entered disabled state [ 1903.651500][T11618] bridge1177: port 1(bridge_slave_0) entered blocking state [ 1903.662232][T11618] bridge1177: port 1(bridge_slave_0) entered disabled state [ 1903.671780][T11618] device bridge_slave_0 entered promiscuous mode [ 1903.682704][T11618] bridge1177: port 1(bridge_slave_0) entered blocking state [ 1903.690070][T11618] bridge1177: port 1(bridge_slave_0) entered forwarding state [ 1903.730534][T11620] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffa888}, 0x0) [ 1903.802526][T11623] device bridge18 entered promiscuous mode [ 1903.849437][T11699] device bridge1421 entered promiscuous mode [ 1903.876834][T11729] device bridge29 entered promiscuous mode 18:12:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfeffffff}, 0x0) [ 1903.898900][T11731] device bridge_slave_0 left promiscuous mode [ 1903.918261][T11731] bridge1420: port 1(bridge_slave_0) entered disabled state 18:12:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffe}, 0x0) [ 1903.974312][T11731] bridge1421: port 1(bridge_slave_0) entered blocking state [ 1903.982175][T11731] bridge1421: port 1(bridge_slave_0) entered disabled state [ 1903.991123][T11731] device bridge_slave_0 entered promiscuous mode [ 1903.999753][T11731] bridge1421: port 1(bridge_slave_0) entered blocking state [ 1904.007081][T11731] bridge1421: port 1(bridge_slave_0) entered forwarding state [ 1904.032750][T11835] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1904.041202][T11835] device bridge1421 left promiscuous mode [ 1904.090804][T11620] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:12:54 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40d088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1904.132417][T11839] device bridge97 entered promiscuous mode [ 1904.158207][T11840] device bridge_slave_0 left promiscuous mode 18:12:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9acc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1904.190018][T11840] bridge96: port 1(bridge_slave_0) entered disabled state [ 1904.286806][T11840] bridge97: port 1(bridge_slave_0) entered blocking state [ 1904.294848][T11840] bridge97: port 1(bridge_slave_0) entered disabled state [ 1904.303265][T11840] device bridge_slave_0 entered promiscuous mode [ 1904.354907][T11844] device bridge19 entered promiscuous mode [ 1904.372181][T11699] device bridge1421 entered promiscuous mode 18:12:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfeffffff}, 0x0) 18:12:54 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x40005c, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 1904.424239][T11948] device bridge30 entered promiscuous mode [ 1904.450754][T11835] device bridge1421 left promiscuous mode 18:12:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xb8a03eda}, 0x0) [ 1904.565296][T12055] device bridge1178 entered promiscuous mode [ 1904.603772][T12056] device bridge_slave_0 left promiscuous mode 18:12:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffff7f00000000) [ 1904.639294][T12056] bridge1177: port 1(bridge_slave_0) entered disabled state [ 1904.704649][T12056] bridge1178: port 1(bridge_slave_0) entered blocking state [ 1904.744969][T12056] bridge1178: port 1(bridge_slave_0) entered disabled state [ 1904.754466][T12056] device bridge_slave_0 entered promiscuous mode [ 1904.785103][T12056] bridge1178: port 1(bridge_slave_0) entered blocking state [ 1904.792465][T12056] bridge1178: port 1(bridge_slave_0) entered forwarding state 18:12:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x7400, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1904.853186][T12063] device bridge20 entered promiscuous mode [ 1904.882755][T12162] device bridge31 entered promiscuous mode 18:12:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xfeffffff}, 0x0) 18:12:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xb8a03eda}, 0x0) [ 1904.995141][T12272] device bridge1422 entered promiscuous mode [ 1905.098352][T12277] device bridge1422 left promiscuous mode 18:12:55 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40f088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9bcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1905.149137][T12273] device bridge_slave_0 left promiscuous mode [ 1905.164916][T12273] bridge1421: port 1(bridge_slave_0) entered disabled state [ 1905.264509][T12273] bridge1422: port 1(bridge_slave_0) entered blocking state [ 1905.288278][T12273] bridge1422: port 1(bridge_slave_0) entered disabled state [ 1905.296503][T12273] device bridge_slave_0 entered promiscuous mode [ 1905.304773][T12273] bridge1422: port 1(bridge_slave_0) entered blocking state [ 1905.312284][T12273] bridge1422: port 1(bridge_slave_0) entered forwarding state [ 1905.346951][T12280] device bridge98 entered promiscuous mode [ 1905.377016][T12283] device bridge21 entered promiscuous mode 18:12:55 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1905.414236][T12285] device bridge32 entered promiscuous mode [ 1905.425050][T12286] device bridge_slave_0 left promiscuous mode [ 1905.450872][T12286] bridge97: port 1(bridge_slave_0) entered disabled state 18:12:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}, 0x1, 0x0, 0xb8a03eda}, 0x0) [ 1905.501568][T12286] bridge98: port 1(bridge_slave_0) entered blocking state [ 1905.523678][T12286] bridge98: port 1(bridge_slave_0) entered disabled state [ 1905.568284][T12503] FAULT_INJECTION: forcing a failure. [ 1905.568284][T12503] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.571890][T12286] device bridge_slave_0 entered promiscuous mode [ 1905.581092][T12503] CPU: 0 PID: 12503 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1905.595928][T12503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1905.605978][T12503] Call Trace: [ 1905.609280][T12503] dump_stack+0x11d/0x181 [ 1905.613730][T12503] should_fail.cold+0xa/0x1a [ 1905.618362][T12503] __should_failslab+0xee/0x130 [ 1905.623285][T12503] should_failslab+0x9/0x14 [ 1905.627829][T12503] kmem_cache_alloc_node+0x39/0x660 [ 1905.632314][T12504] device bridge33 entered promiscuous mode [ 1905.633043][T12503] ? __netlink_lookup+0x24e/0x300 [ 1905.633075][T12503] __alloc_skb+0x8e/0x360 [ 1905.648258][T12503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.654603][T12503] ? netlink_autobind.isra.0+0x135/0x170 [ 1905.660258][T12503] netlink_sendmsg+0x667/0x8b0 [ 1905.665061][T12503] ? netlink_unicast+0x4d0/0x4d0 [ 1905.668023][T12504] device bridge_slave_0 left promiscuous mode [ 1905.670015][T12503] sock_sendmsg+0x9f/0xc0 [ 1905.670040][T12503] ____sys_sendmsg+0x49d/0x4d0 [ 1905.670093][T12503] ___sys_sendmsg+0xb5/0x100 [ 1905.676491][T12504] bridge15: port 1(bridge_slave_0) entered disabled state [ 1905.680571][T12503] ? __fget+0xb8/0x1d0 [ 1905.701192][T12503] ? __fget_light+0xaf/0x190 [ 1905.705877][T12503] ? __fdget+0x2c/0x40 [ 1905.709947][T12503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1905.716251][T12503] __sys_sendmsg+0xa0/0x160 [ 1905.720751][T12503] __x64_sys_sendmsg+0x51/0x70 [ 1905.725522][T12503] do_syscall_64+0xcc/0x3a0 [ 1905.730042][T12503] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1905.736088][T12503] RIP: 0033:0x45aff9 [ 1905.740003][T12503] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1905.759664][T12503] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1905.768150][T12503] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1905.776124][T12503] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1905.784090][T12503] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1905.792046][T12503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1905.800005][T12503] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000000 18:12:56 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1905.845123][T12504] bridge33: port 1(bridge_slave_0) entered blocking state [ 1905.856222][T12504] bridge33: port 1(bridge_slave_0) entered disabled state [ 1905.906745][T12504] device bridge_slave_0 entered promiscuous mode [ 1905.939341][T12504] bridge33: port 1(bridge_slave_0) entered blocking state [ 1905.946532][T12504] bridge33: port 1(bridge_slave_0) entered forwarding state [ 1905.986645][T12608] FAULT_INJECTION: forcing a failure. [ 1905.986645][T12608] name failslab, interval 1, probability 0, space 0, times 0 [ 1906.002219][T12608] CPU: 1 PID: 12608 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1906.011026][T12608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1906.021082][T12608] Call Trace: [ 1906.024385][T12608] dump_stack+0x11d/0x181 [ 1906.028733][T12608] should_fail.cold+0xa/0x1a [ 1906.033335][T12608] __should_failslab+0xee/0x130 [ 1906.038203][T12608] should_failslab+0x9/0x14 [ 1906.041410][T12494] device bridge1179 entered promiscuous mode [ 1906.042725][T12608] kmem_cache_alloc_node_trace+0x3b/0x670 [ 1906.042755][T12608] ? memcg_kmem_put_cache+0x7c/0xc0 [ 1906.059621][T12608] __kmalloc_node_track_caller+0x38/0x50 [ 1906.065369][T12608] __kmalloc_reserve.isra.0+0x49/0xd0 [ 1906.070752][T12608] __alloc_skb+0xc2/0x360 [ 1906.075092][T12608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.081343][T12608] ? netlink_autobind.isra.0+0x135/0x170 [ 1906.087065][T12608] netlink_sendmsg+0x667/0x8b0 [ 1906.091848][T12608] ? netlink_unicast+0x4d0/0x4d0 [ 1906.096884][T12608] sock_sendmsg+0x9f/0xc0 [ 1906.101247][T12608] ____sys_sendmsg+0x49d/0x4d0 [ 1906.106041][T12608] ___sys_sendmsg+0xb5/0x100 [ 1906.110640][T12608] ? __fget+0xb8/0x1d0 [ 1906.114723][T12608] ? __fget_light+0xaf/0x190 [ 1906.119372][T12608] ? __fdget+0x2c/0x40 [ 1906.123468][T12608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1906.129756][T12608] __sys_sendmsg+0xa0/0x160 [ 1906.134422][T12608] __x64_sys_sendmsg+0x51/0x70 [ 1906.139237][T12608] do_syscall_64+0xcc/0x3a0 [ 1906.143837][T12608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1906.149844][T12608] RIP: 0033:0x45aff9 [ 1906.153748][T12608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1906.173355][T12608] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 18:12:56 executing program 3 (fault-call:3 fault-nth:0): socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:56 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1906.181776][T12608] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1906.189751][T12608] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1906.197722][T12608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1906.205678][T12608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1906.213704][T12608] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000001 [ 1906.227378][T12273] device bridge1422 entered promiscuous mode [ 1906.334844][T12616] FAULT_INJECTION: forcing a failure. [ 1906.334844][T12616] name failslab, interval 1, probability 0, space 0, times 0 [ 1906.349480][T12616] CPU: 1 PID: 12616 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1906.358168][T12616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1906.368318][T12616] Call Trace: [ 1906.371637][T12616] dump_stack+0x11d/0x181 [ 1906.376091][T12616] should_fail.cold+0xa/0x1a [ 1906.380769][T12616] __should_failslab+0xee/0x130 [ 1906.385665][T12616] should_failslab+0x9/0x14 [ 1906.390169][T12616] __kmalloc+0x53/0x690 [ 1906.394405][T12616] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 1906.400118][T12616] tomoyo_realpath_from_path+0x83/0x4c0 [ 1906.405649][T12616] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 1906.411017][T12616] tomoyo_path_number_perm+0x10a/0x3c0 [ 1906.416540][T12616] ? __read_once_size+0x41/0xe0 [ 1906.421384][T12616] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1906.427266][T12616] ? __read_once_size+0x5a/0xe0 [ 1906.432204][T12616] tomoyo_path_chmod+0x2f/0x40 [ 1906.436956][T12616] security_path_chmod+0xac/0xe0 [ 1906.441880][T12616] chmod_common+0xe0/0x2d0 [ 1906.446300][T12616] ? __fget_light+0xaf/0x190 [ 1906.450941][T12616] ksys_fchmod+0x9e/0xf0 [ 1906.455244][T12616] __x64_sys_fchmod+0x3b/0x50 [ 1906.460027][T12616] do_syscall_64+0xcc/0x3a0 [ 1906.464623][T12616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1906.470580][T12616] RIP: 0033:0x45aff9 [ 1906.474472][T12616] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1906.494059][T12616] RSP: 002b:00007f43c09dac78 EFLAGS: 00000246 ORIG_RAX: 000000000000005b [ 1906.502482][T12616] RAX: ffffffffffffffda RBX: 00007f43c09db6d4 RCX: 000000000045aff9 [ 1906.510463][T12616] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1906.518429][T12616] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1906.526391][T12616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:12:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1906.534345][T12616] R13: 00000000000000ac R14: 00000000004c1a96 R15: 0000000000000000 [ 1906.546519][T12616] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1906.553624][T12495] device bridge_slave_0 left promiscuous mode [ 1906.560140][T12495] bridge1178: port 1(bridge_slave_0) entered disabled state [ 1906.642694][T12495] bridge1179: port 1(bridge_slave_0) entered blocking state [ 1906.660938][T12495] bridge1179: port 1(bridge_slave_0) entered disabled state [ 1906.675984][T12495] device bridge_slave_0 entered promiscuous mode [ 1906.691656][T12495] bridge1179: port 1(bridge_slave_0) entered blocking state [ 1906.698983][T12495] bridge1179: port 1(bridge_slave_0) entered forwarding state [ 1906.721439][T12274] validate_nla: 6 callbacks suppressed [ 1906.721452][T12274] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1906.737126][T12274] device bridge1422 left promiscuous mode 18:12:57 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x11, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0xffffffff00000000) 18:12:57 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) [ 1906.750843][T12496] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1906.817026][T12626] FAULT_INJECTION: forcing a failure. [ 1906.817026][T12626] name failslab, interval 1, probability 0, space 0, times 0 [ 1906.832233][T12626] CPU: 1 PID: 12626 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1906.840972][T12626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1906.851027][T12626] Call Trace: [ 1906.854361][T12626] dump_stack+0x11d/0x181 [ 1906.858696][T12626] should_fail.cold+0xa/0x1a [ 1906.863294][T12626] __should_failslab+0xee/0x130 [ 1906.868199][T12626] should_failslab+0x9/0x14 [ 1906.872707][T12626] kmem_cache_alloc+0x29/0x5d0 [ 1906.877485][T12626] ? __rcu_read_unlock+0x66/0x3d0 [ 1906.882566][T12626] ? memcg_kmem_put_cache+0x7c/0xc0 [ 1906.887748][T12626] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1906.893720][T12626] skb_clone+0xf9/0x290 [ 1906.897866][T12626] netlink_deliver_tap+0x428/0x4a0 [ 1906.903112][T12626] netlink_unicast+0x43a/0x4d0 [ 1906.907941][T12626] netlink_sendmsg+0x4d3/0x8b0 [ 1906.912718][T12626] ? netlink_unicast+0x4d0/0x4d0 [ 1906.917640][T12626] sock_sendmsg+0x9f/0xc0 [ 1906.921967][T12626] ____sys_sendmsg+0x49d/0x4d0 [ 1906.926729][T12626] ___sys_sendmsg+0xb5/0x100 [ 1906.931378][T12626] ? __fget+0xb8/0x1d0 [ 1906.935531][T12626] ? __fget_light+0xaf/0x190 [ 1906.940155][T12626] ? __fdget+0x2c/0x40 [ 1906.944254][T12626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1906.950545][T12626] __sys_sendmsg+0xa0/0x160 [ 1906.955046][T12626] __x64_sys_sendmsg+0x51/0x70 [ 1906.959831][T12626] do_syscall_64+0xcc/0x3a0 [ 1906.964320][T12626] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1906.970203][T12626] RIP: 0033:0x45aff9 [ 1906.974110][T12626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1906.993699][T12626] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1907.002115][T12626] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1907.010070][T12626] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 18:12:57 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb410088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9ccc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1907.018058][T12626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1907.026154][T12626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1907.034110][T12626] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000002 [ 1907.052012][T12626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:12:57 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x0) 18:12:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x88, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1907.203365][T12729] device bridge1180 entered promiscuous mode [ 1907.335347][T12750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1907.357913][T12738] device bridge1423 entered promiscuous mode [ 1907.367468][T12750] FAULT_INJECTION: forcing a failure. [ 1907.367468][T12750] name failslab, interval 1, probability 0, space 0, times 0 [ 1907.388174][T12750] CPU: 0 PID: 12750 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1907.396869][T12750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1907.404462][T12739] device bridge_slave_0 left promiscuous mode [ 1907.406923][T12750] Call Trace: [ 1907.407005][T12750] dump_stack+0x11d/0x181 [ 1907.407071][T12750] should_fail.cold+0xa/0x1a [ 1907.413933][T12739] bridge1179: port 1(bridge_slave_0) entered disabled state [ 1907.416396][T12750] __should_failslab+0xee/0x130 [ 1907.416414][T12750] should_failslab+0x9/0x14 [ 1907.416507][T12750] kmem_cache_alloc+0x29/0x5d0 [ 1907.446810][T12750] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1907.452705][T12750] __nf_conntrack_alloc+0xe9/0x380 [ 1907.457817][T12750] nf_conntrack_alloc+0x41/0x60 [ 1907.462690][T12750] ctnetlink_create_conntrack+0x58/0x970 [ 1907.468327][T12750] ctnetlink_new_conntrack+0x3b6/0x8c0 [ 1907.473813][T12750] ? ctnetlink_new_expect+0x310/0x310 [ 1907.479186][T12750] nfnetlink_rcv_msg+0x511/0x560 [ 1907.484132][T12750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.490355][T12750] ? security_capable+0x92/0xb0 [ 1907.495267][T12750] netlink_rcv_skb+0xb0/0x260 [ 1907.500002][T12750] ? __read_once_size.constprop.0+0x20/0x20 [ 1907.505908][T12750] nfnetlink_rcv+0x103/0x2a0 [ 1907.510494][T12750] netlink_unicast+0x3a6/0x4d0 [ 1907.515243][T12750] netlink_sendmsg+0x4d3/0x8b0 [ 1907.520062][T12750] ? netlink_unicast+0x4d0/0x4d0 [ 1907.525028][T12750] sock_sendmsg+0x9f/0xc0 [ 1907.529340][T12750] ____sys_sendmsg+0x49d/0x4d0 [ 1907.534111][T12750] ___sys_sendmsg+0xb5/0x100 [ 1907.538761][T12750] ? __fget+0xb8/0x1d0 [ 1907.542901][T12750] ? __fget_light+0xaf/0x190 [ 1907.547475][T12750] ? __fdget+0x2c/0x40 [ 1907.551554][T12750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1907.557949][T12750] __sys_sendmsg+0xa0/0x160 [ 1907.562463][T12750] __x64_sys_sendmsg+0x51/0x70 [ 1907.567209][T12750] do_syscall_64+0xcc/0x3a0 [ 1907.571696][T12750] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1907.577621][T12750] RIP: 0033:0x45aff9 [ 1907.581575][T12750] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1907.601161][T12750] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1907.609599][T12750] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1907.617551][T12750] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1907.625656][T12750] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 18:12:58 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1100, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x2) [ 1907.633718][T12750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1907.641669][T12750] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000003 [ 1907.706549][T12739] bridge1180: port 1(bridge_slave_0) entered blocking state [ 1907.733100][T12739] bridge1180: port 1(bridge_slave_0) entered disabled state [ 1907.786040][T12739] device bridge_slave_0 entered promiscuous mode [ 1907.821915][T12739] bridge1180: port 1(bridge_slave_0) entered blocking state 18:12:58 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x3) [ 1907.829364][T12739] bridge1180: port 1(bridge_slave_0) entered forwarding state [ 1907.870238][T12741] device bridge_slave_0 left promiscuous mode [ 1907.876845][T12741] bridge1422: port 1(bridge_slave_0) entered disabled state 18:12:58 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x8800, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1907.984593][T12968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1908.018246][T12968] FAULT_INJECTION: forcing a failure. [ 1908.018246][T12968] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.027844][T12741] bridge1423: port 1(bridge_slave_0) entered blocking state [ 1908.056936][T12968] CPU: 0 PID: 12968 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1908.058809][T12741] bridge1423: port 1(bridge_slave_0) entered disabled state [ 1908.065690][T12968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.065695][T12968] Call Trace: [ 1908.065720][T12968] dump_stack+0x11d/0x181 [ 1908.065755][T12968] should_fail.cold+0xa/0x1a [ 1908.082835][T12741] device bridge_slave_0 entered promiscuous mode [ 1908.083074][T12968] __should_failslab+0xee/0x130 [ 1908.083093][T12968] should_failslab+0x9/0x14 [ 1908.083176][T12968] __kmalloc_track_caller+0x4f/0x690 [ 1908.083222][T12968] ? kmem_cache_alloc+0x1f3/0x5d0 [ 1908.092803][T12741] bridge1423: port 1(bridge_slave_0) entered blocking state [ 1908.095373][T12968] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1908.095402][T12968] ? __read_once_size+0x41/0xe0 [ 1908.101721][T12741] bridge1423: port 1(bridge_slave_0) entered forwarding state [ 1908.106596][T12968] ? nf_ct_ext_add+0x151/0x280 [ 1908.128057][T12742] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1908.128594][T12968] krealloc+0x7f/0xb0 [ 1908.128622][T12968] nf_ct_ext_add+0x151/0x280 [ 1908.168398][T12968] ctnetlink_create_conntrack+0x3f8/0x970 [ 1908.174136][T12968] ctnetlink_new_conntrack+0x3b6/0x8c0 [ 1908.179615][T12968] ? ctnetlink_new_expect+0x310/0x310 [ 1908.185004][T12968] nfnetlink_rcv_msg+0x511/0x560 [ 1908.190021][T12968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.196435][T12968] ? security_capable+0x92/0xb0 [ 1908.201288][T12968] netlink_rcv_skb+0xb0/0x260 [ 1908.205967][T12968] ? __read_once_size.constprop.0+0x20/0x20 [ 1908.211876][T12968] nfnetlink_rcv+0x103/0x2a0 [ 1908.216476][T12968] netlink_unicast+0x3a6/0x4d0 [ 1908.221241][T12968] netlink_sendmsg+0x4d3/0x8b0 [ 1908.226015][T12968] ? netlink_unicast+0x4d0/0x4d0 [ 1908.230996][T12968] sock_sendmsg+0x9f/0xc0 [ 1908.235335][T12968] ____sys_sendmsg+0x49d/0x4d0 [ 1908.240181][T12968] ___sys_sendmsg+0xb5/0x100 [ 1908.244790][T12968] ? __fget+0xb8/0x1d0 [ 1908.248882][T12968] ? __fget_light+0xaf/0x190 [ 1908.253474][T12968] ? __fdget+0x2c/0x40 [ 1908.257550][T12968] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1908.263823][T12968] __sys_sendmsg+0xa0/0x160 [ 1908.268492][T12968] __x64_sys_sendmsg+0x51/0x70 [ 1908.273265][T12968] do_syscall_64+0xcc/0x3a0 [ 1908.277861][T12968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1908.283869][T12968] RIP: 0033:0x45aff9 [ 1908.287779][T12968] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1908.307419][T12968] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1908.315828][T12968] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1908.323795][T12968] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1908.331774][T12968] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1908.339744][T12968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1908.347713][T12968] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000004 [ 1908.402104][T12755] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1908.411308][T12755] device bridge1423 left promiscuous mode [ 1908.449035][T12966] device bridge1423 entered promiscuous mode [ 1908.470378][T12739] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1908.495018][T12970] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1908.507873][T12970] device bridge1423 left promiscuous mode 18:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r9 = dup(r8) write$P9_RGETATTR(r9, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$NBD_CLEAR_SOCK(r9, 0xab04) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x38c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:12:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:12:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x4) 18:12:59 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:12:59 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb43a088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:12:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9dcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1908.644852][T13085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:12:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x5) [ 1908.696248][T13085] FAULT_INJECTION: forcing a failure. [ 1908.696248][T13085] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.733466][T13083] device bridge1181 entered promiscuous mode [ 1908.748117][T13085] CPU: 1 PID: 13085 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1908.756810][T13085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.765389][T13197] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1908.766891][T13085] Call Trace: [ 1908.766916][T13085] dump_stack+0x11d/0x181 [ 1908.767028][T13085] should_fail.cold+0xa/0x1a [ 1908.787278][T13085] __should_failslab+0xee/0x130 [ 1908.792132][T13085] should_failslab+0x9/0x14 [ 1908.796644][T13085] kmem_cache_alloc_node+0x39/0x660 [ 1908.801907][T13085] ? __rcu_read_unlock+0x66/0x3d0 [ 1908.806972][T13085] ? radix_tree_lookup+0x33/0x40 [ 1908.811968][T13085] __alloc_skb+0x8e/0x360 [ 1908.816375][T13085] ? nf_ct_l4proto_find+0x5e/0xd0 [ 1908.821483][T13085] ctnetlink_conntrack_event+0x257/0xb80 [ 1908.827138][T13085] nf_conntrack_eventmask_report+0x1dc/0x350 [ 1908.833124][T13085] ctnetlink_new_conntrack+0x49b/0x8c0 [ 1908.838655][T13085] ? ctnetlink_new_expect+0x310/0x310 [ 1908.844108][T13085] nfnetlink_rcv_msg+0x511/0x560 [ 1908.849102][T13085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.855338][T13085] ? security_capable+0x92/0xb0 [ 1908.860203][T13085] netlink_rcv_skb+0xb0/0x260 [ 1908.864898][T13085] ? __read_once_size.constprop.0+0x20/0x20 [ 1908.870894][T13085] nfnetlink_rcv+0x103/0x2a0 [ 1908.875502][T13085] netlink_unicast+0x3a6/0x4d0 [ 1908.880281][T13085] netlink_sendmsg+0x4d3/0x8b0 [ 1908.885059][T13085] ? netlink_unicast+0x4d0/0x4d0 [ 1908.890002][T13085] sock_sendmsg+0x9f/0xc0 [ 1908.894334][T13085] ____sys_sendmsg+0x49d/0x4d0 [ 1908.899115][T13085] ___sys_sendmsg+0xb5/0x100 [ 1908.903747][T13085] ? __fget+0xb8/0x1d0 [ 1908.907835][T13085] ? __fget_light+0xaf/0x190 [ 1908.912431][T13085] ? __fdget+0x2c/0x40 [ 1908.916511][T13085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1908.922774][T13085] __sys_sendmsg+0xa0/0x160 [ 1908.927334][T13085] __x64_sys_sendmsg+0x51/0x70 [ 1908.932111][T13085] do_syscall_64+0xcc/0x3a0 [ 1908.936734][T13085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1908.937319][T13190] device bridge_slave_0 left promiscuous mode [ 1908.942626][T13085] RIP: 0033:0x45aff9 [ 1908.942651][T13085] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1908.942661][T13085] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1908.942678][T13085] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1908.942699][T13085] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 18:12:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x11000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1908.951919][T13190] bridge1180: port 1(bridge_slave_0) entered disabled state [ 1908.952673][T13085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1909.011852][T13085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1909.019807][T13085] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000005 18:12:59 executing program 1 (fault-call:1 fault-nth:6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1909.081909][T13190] bridge1181: port 1(bridge_slave_0) entered blocking state [ 1909.128124][T13190] bridge1181: port 1(bridge_slave_0) entered disabled state 18:12:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x88000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1909.216945][T13190] device bridge_slave_0 entered promiscuous mode [ 1909.256551][T13314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:12:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x6) [ 1909.275333][T13314] FAULT_INJECTION: forcing a failure. [ 1909.275333][T13314] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.291748][T13190] bridge1181: port 1(bridge_slave_0) entered blocking state [ 1909.294021][T13314] CPU: 0 PID: 13314 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1909.299154][T13190] bridge1181: port 1(bridge_slave_0) entered forwarding state [ 1909.307790][T13314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1909.325250][T13314] Call Trace: [ 1909.328597][T13314] dump_stack+0x11d/0x181 [ 1909.333020][T13314] should_fail.cold+0xa/0x1a [ 1909.337645][T13314] __should_failslab+0xee/0x130 [ 1909.342508][T13314] should_failslab+0x9/0x14 [ 1909.347036][T13314] kmem_cache_alloc_node_trace+0x3b/0x670 [ 1909.352762][T13314] ? memcg_kmem_put_cache+0x7c/0xc0 [ 1909.357969][T13314] __kmalloc_node_track_caller+0x38/0x50 [ 1909.363711][T13314] __kmalloc_reserve.isra.0+0x49/0xd0 [ 1909.369093][T13314] __alloc_skb+0xc2/0x360 18:12:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x7) [ 1909.373477][T13314] ? nf_ct_l4proto_find+0x5e/0xd0 [ 1909.378506][T13314] ctnetlink_conntrack_event+0x257/0xb80 [ 1909.384214][T13314] nf_conntrack_eventmask_report+0x1dc/0x350 [ 1909.390200][T13314] ctnetlink_new_conntrack+0x49b/0x8c0 [ 1909.395749][T13314] ? ctnetlink_new_expect+0x310/0x310 [ 1909.401155][T13314] nfnetlink_rcv_msg+0x511/0x560 [ 1909.406127][T13314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.412420][T13314] ? security_capable+0x92/0xb0 [ 1909.417359][T13314] netlink_rcv_skb+0xb0/0x260 [ 1909.422104][T13314] ? __read_once_size.constprop.0+0x20/0x20 [ 1909.428043][T13314] nfnetlink_rcv+0x103/0x2a0 [ 1909.432647][T13314] netlink_unicast+0x3a6/0x4d0 [ 1909.437468][T13314] netlink_sendmsg+0x4d3/0x8b0 [ 1909.442311][T13314] ? netlink_unicast+0x4d0/0x4d0 [ 1909.447251][T13314] sock_sendmsg+0x9f/0xc0 [ 1909.451626][T13314] ____sys_sendmsg+0x49d/0x4d0 [ 1909.456399][T13314] ___sys_sendmsg+0xb5/0x100 [ 1909.460989][T13314] ? __fget+0xb8/0x1d0 [ 1909.465132][T13314] ? __fget_light+0xaf/0x190 [ 1909.469734][T13314] ? __fdget+0x2c/0x40 [ 1909.473883][T13314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.480152][T13314] __sys_sendmsg+0xa0/0x160 [ 1909.484680][T13314] __x64_sys_sendmsg+0x51/0x70 [ 1909.489450][T13314] do_syscall_64+0xcc/0x3a0 [ 1909.493973][T13314] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1909.499868][T13314] RIP: 0033:0x45aff9 [ 1909.503776][T13314] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1909.523419][T13314] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1909.531920][T13314] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1909.539893][T13314] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1909.547718][T13196] device bridge1424 entered promiscuous mode [ 1909.547878][T13314] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1909.561917][T13314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1909.569902][T13314] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000006 [ 1909.736951][T13198] device bridge_slave_0 left promiscuous mode [ 1909.752786][T13198] bridge1423: port 1(bridge_slave_0) entered disabled state [ 1909.825462][T13198] bridge1424: port 1(bridge_slave_0) entered blocking state [ 1909.834187][T13198] bridge1424: port 1(bridge_slave_0) entered disabled state [ 1909.842920][T13198] device bridge_slave_0 entered promiscuous mode [ 1909.851571][T13198] bridge1424: port 1(bridge_slave_0) entered blocking state [ 1909.858988][T13198] bridge1424: port 1(bridge_slave_0) entered forwarding state 18:13:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x100000000000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x8) 18:13:00 executing program 1 (fault-call:1 fault-nth:7): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:13:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) r8 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r8, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r9 = dup(r8) write$P9_RGETATTR(r9, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r9, 0xc008551b, &(0x7f0000000040)={0x9, 0x4, [0xfef5]}) 18:13:00 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb45d088324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1909.914682][T13197] netlink: 'syz-executor.2': attribute type 25 has an invalid length. 18:13:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9ecc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) [ 1910.006858][T13439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1910.037424][T13439] FAULT_INJECTION: forcing a failure. [ 1910.037424][T13439] name failslab, interval 1, probability 0, space 0, times 0 18:13:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0xc) 18:13:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1100000000000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1910.099974][T13439] CPU: 0 PID: 13439 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 1910.108726][T13439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1910.118839][T13439] Call Trace: [ 1910.122133][T13439] dump_stack+0x11d/0x181 [ 1910.126520][T13439] should_fail.cold+0xa/0x1a [ 1910.131125][T13439] __should_failslab+0xee/0x130 [ 1910.135990][T13439] should_failslab+0x9/0x14 [ 1910.140506][T13439] kmem_cache_alloc+0x29/0x5d0 [ 1910.145352][T13439] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1910.151290][T13439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.157537][T13439] ? debug_smp_processor_id+0x43/0x137 [ 1910.163008][T13439] skb_clone+0xf9/0x290 [ 1910.167174][T13439] netlink_deliver_tap+0x428/0x4a0 [ 1910.172301][T13439] ? netlink_attachskb+0x1d5/0x4a0 [ 1910.177418][T13439] __netlink_sendskb+0x41/0x80 [ 1910.182261][T13439] netlink_unicast+0x486/0x4d0 [ 1910.187034][T13439] nlmsg_notify+0x186/0x200 [ 1910.191543][T13439] nfnetlink_send+0x5a/0x80 [ 1910.196056][T13439] ctnetlink_conntrack_event+0x78e/0xb80 [ 1910.201703][T13439] nf_conntrack_eventmask_report+0x1dc/0x350 [ 1910.207745][T13439] ctnetlink_new_conntrack+0x49b/0x8c0 [ 1910.213294][T13439] ? ctnetlink_new_expect+0x310/0x310 [ 1910.218676][T13439] nfnetlink_rcv_msg+0x511/0x560 [ 1910.223696][T13439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.230005][T13439] ? security_capable+0x92/0xb0 [ 1910.234867][T13439] netlink_rcv_skb+0xb0/0x260 [ 1910.239552][T13439] ? __read_once_size.constprop.0+0x20/0x20 [ 1910.245529][T13439] nfnetlink_rcv+0x103/0x2a0 [ 1910.250129][T13439] netlink_unicast+0x3a6/0x4d0 [ 1910.254937][T13439] netlink_sendmsg+0x4d3/0x8b0 [ 1910.259712][T13439] ? netlink_unicast+0x4d0/0x4d0 [ 1910.264658][T13439] sock_sendmsg+0x9f/0xc0 [ 1910.268991][T13439] ____sys_sendmsg+0x49d/0x4d0 [ 1910.273882][T13439] ___sys_sendmsg+0xb5/0x100 [ 1910.278480][T13439] ? __fget+0xb8/0x1d0 [ 1910.282549][T13439] ? __fget_light+0xaf/0x190 [ 1910.287221][T13439] ? __fdget+0x2c/0x40 [ 1910.291306][T13439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 18:13:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x12) 18:13:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x8800000000000000, 0x48c, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1910.297550][T13439] __sys_sendmsg+0xa0/0x160 [ 1910.302097][T13439] __x64_sys_sendmsg+0x51/0x70 [ 1910.306870][T13439] do_syscall_64+0xcc/0x3a0 [ 1910.311385][T13439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1910.317267][T13439] RIP: 0033:0x45aff9 [ 1910.321199][T13439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1910.340929][T13439] RSP: 002b:00007fb5c866dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1910.349390][T13439] RAX: ffffffffffffffda RBX: 00007fb5c866e6d4 RCX: 000000000045aff9 [ 1910.357362][T13439] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 1910.365343][T13439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1910.373322][T13439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1910.381310][T13439] R13: 00000000000008bd R14: 00000000004c9d78 R15: 0000000000000007 [ 1910.434963][T13546] device bridge1425 entered promiscuous mode [ 1910.453620][T13675] device bridge_slave_0 left promiscuous mode [ 1910.460289][T13675] bridge1424: port 1(bridge_slave_0) entered disabled state [ 1910.508548][T13675] bridge1425: port 1(bridge_slave_0) entered blocking state [ 1910.572010][T13675] bridge1425: port 1(bridge_slave_0) entered disabled state 18:13:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x30) 18:13:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:01 executing program 1 (fault-call:1 fault-nth:8): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1910.622594][T13675] device bridge_slave_0 entered promiscuous mode [ 1910.682730][T13675] bridge1425: port 1(bridge_slave_0) entered blocking state [ 1910.690087][T13675] bridge1425: port 1(bridge_slave_0) entered forwarding state 18:13:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1910.836256][T13731] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1910.845849][T13887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1910.867546][T13731] device bridge1425 left promiscuous mode 18:13:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x300) [ 1910.997357][T13780] device bridge1182 entered promiscuous mode [ 1911.029659][T13785] device bridge_slave_0 left promiscuous mode [ 1911.036227][T13785] bridge1181: port 1(bridge_slave_0) entered disabled state [ 1911.117110][T13785] bridge1182: port 1(bridge_slave_0) entered blocking state [ 1911.148988][T13785] bridge1182: port 1(bridge_slave_0) entered disabled state [ 1911.166561][T13785] device bridge_slave_0 entered promiscuous mode [ 1911.178886][T13785] bridge1182: port 1(bridge_slave_0) entered blocking state [ 1911.186276][T13785] bridge1182: port 1(bridge_slave_0) entered forwarding state [ 1911.200827][T13787] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1911.219923][T13546] device bridge1425 entered promiscuous mode [ 1911.251208][T13779] device bridge1425 left promiscuous mode 18:13:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x8, {}, 0xcb}}, 0xa0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r8, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) r9 = socket(0x10, 0x80002, 0x0) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x0, 0x110}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:13:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9effffff, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:13:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:13:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x408) 18:13:01 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e028324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="95ecbde5466503d8a432911de502a7777e4ae69ee50d9f752fd62747a7233080874f1f36108015dc9f3457e9e3468127972f6c082a7eefe0cc3f55d19396f38485eb65c3383282de460300000099b44dd1bd7604770f180b86b285030000005f3e86841df9a6daf7335ce6aa34273a95cb78af20f8a118e0c2c1423b4a3f10d88a5d29f69394d33719bab15dc9924f9635d8d7975d9e3ad646d88fdad9f60e23451d4587e64d61160c347abac12a0bb4a7c97f52471e313b8e40ebcb782a3efd17384d49f470feab5fd64bfb20f597c2254480c0b232e145bd69e66069b5fc0d9993404e2a062641211a681e8f5f0e6ce831a479d18db46deb89000000000000000000", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1911.399210][T14088] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:13:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x5, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x500) 18:13:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1911.561667][T14131] device bridge1426 entered promiscuous mode [ 1911.692134][T14133] device bridge1183 entered promiscuous mode 18:13:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x6, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x600) [ 1911.758358][T14135] device bridge_slave_0 left promiscuous mode [ 1911.764670][T14135] bridge1182: port 1(bridge_slave_0) entered disabled state [ 1911.780107][T14248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:13:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x7, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1911.882431][T14135] bridge1183: port 1(bridge_slave_0) entered blocking state [ 1911.905766][T14135] bridge1183: port 1(bridge_slave_0) entered disabled state [ 1911.924027][T14135] device bridge_slave_0 entered promiscuous mode [ 1911.941551][T14135] bridge1183: port 1(bridge_slave_0) entered blocking state [ 1911.948994][T14135] bridge1183: port 1(bridge_slave_0) entered forwarding state [ 1912.023492][T14134] device bridge_slave_0 left promiscuous mode [ 1912.037288][T14134] bridge1425: port 1(bridge_slave_0) entered disabled state [ 1912.096929][T14134] bridge1426: port 1(bridge_slave_0) entered blocking state [ 1912.122969][T14134] bridge1426: port 1(bridge_slave_0) entered disabled state [ 1912.157684][T14134] device bridge_slave_0 entered promiscuous mode [ 1912.173672][T14134] bridge1426: port 1(bridge_slave_0) entered blocking state [ 1912.181013][T14134] bridge1426: port 1(bridge_slave_0) entered forwarding state [ 1912.224937][T14138] validate_nla: 2 callbacks suppressed [ 1912.224949][T14138] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1912.263096][T14131] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1912.275935][T14131] device bridge1426 left promiscuous mode [ 1912.345505][T14139] device bridge1426 entered promiscuous mode [ 1912.354437][T14138] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1912.381267][T14469] netlink: 'syz-executor.0': attribute type 25 has an invalid length. [ 1912.398598][T14469] device bridge1426 left promiscuous mode 18:13:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x700) 18:13:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:13:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x8, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) 18:13:02 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e038324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) 18:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_MASTER={0x8, 0xa, r6}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x9fcc0300, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_QUERIER={0x8, 0x19, 0x7}]}}}]}, 0x3c}}, 0x0) 18:13:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x34d, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800290000000100"], 0x30}}, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000002040)={0x0, @tipc=@name={0x1e, 0x2, 0x1, {{0x4d7a194f5951f74b, 0x3}, 0x3}}, @ethernet={0x6, @broadcast}, @can={0x1d, 0x0}, 0x5, 0x0, 0x0, 0x0, 0x7fff, &(0x7f0000002000)='ip_vti0\x00', 0xffffffffffffffff, 0x53, 0xfff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', r3}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r7, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=ANY=[@ANYBLOB='<\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="00000000100100001c0012000b00010062726964676500000c0002000800190007000000"], 0x3c}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x4, 0x8, 0x301, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6001}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x200000b0) [ 1912.562795][T14488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:13:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x804) 18:13:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:13:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xa, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1912.648528][T14566] device bridge1185 entered promiscuous mode [ 1912.833369][T14662] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:13:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) 18:13:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0xc00) [ 1912.917373][T14592] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:13:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xb, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1913.013525][T14717] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 18:13:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000240)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x519, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_LABELS={0x6, 0x16, [0x0, 0x0]}]}, 0x88}}, 0x0) [ 1913.084592][T14592] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1913.105509][T14592] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 18:13:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fchmod(r0, 0x1200) 18:13:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xc, &(0x7f0000000100)={0x2, 'veth0_to_bridge\x00'}, 0x18) [ 1913.263673][T14832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1918.313191][T14593] device bridge_slave_0 left promiscuous mode [ 1918.319403][T14593] bridge1183: port 1(bridge_slave_0) entered disabled state [ 1918.365084][T14593] bridge1185: port 1(bridge_slave_0) entered blocking state [ 1918.372469][T14593] bridge1185: port 1(bridge_slave_0) entered disabled state [ 1918.381086][T14593] device bridge_slave_0 entered promiscuous mode [ 1918.388726][T14593] bridge1185: port 1(bridge_slave_0) entered blocking state [ 1918.396031][T14593] bridge1185: port 1(bridge_slave_0) entered forwarding state [ 1918.422016][T14594] device bridge1427 entered promiscuous mode [ 1918.438796][T14566] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 1918.452342][T14597] device bridge_slave_0 left promiscuous mode [ 1918.458583][T14597] bridge1426: port 1(bridge_slave_0) entered disabled state 18:13:09 executing program 5: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000580)='./bus\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="d68399fb343d4218908599196e989c07f830a5fe696f2f74b89e5d665fce0c5b71a6f4d2b0d48707e9ddd1666bcf99d13dcad5b7aa86c850e6ccff5888b09a28d862ac132c917129e96156a16d3099e34999f8ac2f6a1e823d9c0fa49884c1a6f6ddb2db8863282a365c9f7de929ea1c457b53706faa78828f44ee4122cea56a9b89ea305156cc84fb68eff8cb4607705a480e8763e52dc94726703936", 0x9d, 0x324e}, {&(0x7f0000000140)="b6cab7c8b324b4a62448f61fdab20ae2bab3ae48595cfddcf18e6d0745bbb40e048324394b82b51d349f04cacb87faae8bb0b7ffe0be3596a18a97b1bdb91b22649957c03b08fe433a934b6d23e500000000", 0x52, 0x6}, {&(0x7f0000000600)="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", 0xffffffffffffff3e, 0xffffffffffff0001}, {&(0x7f00000001c0)="57db22ba9de09b29b94b114ce4f2c6153057dbb874", 0x15, 0x4}], 0x1009011, &(0x7f0000000480)=ANY=[@ANYRES32]) [ 1918.525323][T14597] bridge1427: port 1(bridge_slave_0) entered blocking state [ 1918.532906][T14597] bridge1427: port 1(bridge_slave_0) entered disabled state [ 1918.540792][T14597] device bridge_slave_0 entered promiscuous mode [ 1918.548416][T14597] bridge1427: port 1(bridge_slave_0) entered blocking state [ 1918.555700][T14597] bridge1427: port 1(bridge_slave_0) entered forwarding state [ 1918.654153][T14713] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1918.687206][T14713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1918.695840][T14713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1921.992082][ C1] ================================================================== [ 1922.000201][ C1] BUG: KCSAN: data-race in ___neigh_create / ___neigh_create [ 1922.007542][ C1] [ 1922.009856][ C1] read to 0xffffffff85e18308 of 8 bytes by interrupt on cpu 0: [ 1922.017382][ C1] ___neigh_create+0x117/0x1230 [ 1922.022228][ C1] __neigh_create+0x38/0x50 [ 1922.026726][ C1] ip6_finish_output2+0x6cb/0xf60 [ 1922.031733][ C1] __ip6_finish_output+0x2d7/0x330 [ 1922.036829][ C1] ip6_finish_output+0x41/0x160 [ 1922.041659][ C1] ip6_output+0x108/0x290 [ 1922.045974][ C1] ndisc_send_skb+0x459/0x5f0 [ 1922.050655][ C1] ndisc_send_rs+0xb3/0x3d0 [ 1922.055153][ C1] addrconf_rs_timer+0x1ee/0x420 [ 1922.060091][ C1] call_timer_fn+0x5f/0x2f0 [ 1922.064593][ C1] run_timer_softirq+0xc0c/0xcd0 [ 1922.069521][ C1] __do_softirq+0x115/0x33f [ 1922.074093][ C1] irq_exit+0xbb/0xe0 [ 1922.078075][ C1] smp_apic_timer_interrupt+0xe6/0x280 [ 1922.083528][ C1] apic_timer_interrupt+0xf/0x20 [ 1922.088456][ C1] native_safe_halt+0xe/0x10 [ 1922.093041][ C1] arch_cpu_idle+0xa/0x10 [ 1922.097362][ C1] default_idle_call+0x1e/0x40 [ 1922.102110][ C1] do_idle+0x1c2/0x290 [ 1922.106172][ C1] cpu_startup_entry+0x1b/0x20 [ 1922.110922][ C1] rest_init+0xec/0xf6 [ 1922.114983][ C1] arch_call_rest_init+0x17/0x37 [ 1922.119909][ C1] start_kernel+0x838/0x85e [ 1922.124404][ C1] x86_64_start_reservations+0x29/0x2b [ 1922.129852][ C1] x86_64_start_kernel+0x72/0x76 [ 1922.134781][ C1] secondary_startup_64+0xa4/0xb0 [ 1922.139786][ C1] [ 1922.142106][ C1] write to 0xffffffff85e18308 of 8 bytes by interrupt on cpu 1: [ 1922.149725][ C1] ___neigh_create+0x994/0x1230 [ 1922.154565][ C1] __neigh_create+0x38/0x50 [ 1922.159059][ C1] ip6_finish_output2+0x6cb/0xf60 [ 1922.164073][ C1] __ip6_finish_output+0x2d7/0x330 [ 1922.169175][ C1] ip6_finish_output+0x41/0x160 [ 1922.174031][ C1] ip6_output+0x108/0x290 [ 1922.178351][ C1] igmp6_send+0x639/0x6f0 [ 1922.182674][ C1] igmp6_timer_handler+0x72/0xf0 [ 1922.187606][ C1] call_timer_fn+0x5f/0x2f0 [ 1922.192105][ C1] run_timer_softirq+0xc0c/0xcd0 [ 1922.197040][ C1] __do_softirq+0x115/0x33f [ 1922.201532][ C1] do_softirq_own_stack+0x2a/0x40 [ 1922.206548][ C1] do_softirq.part.0+0x6b/0x80 [ 1922.211298][ C1] __local_bh_enable_ip+0x76/0x80 [ 1922.216305][ C1] _raw_spin_unlock_bh+0x3f/0x50 [ 1922.221226][ C1] __fib6_clean_all+0xc5/0x150 [ 1922.225985][ C1] fib6_clean_all+0x34/0x50 [ 1922.230474][ C1] rt6_sync_down_dev+0xd0/0xe0 [ 1922.235236][ C1] addrconf_notify+0xe25/0x1550 [ 1922.240074][ C1] notifier_call_chain+0xd7/0x160 [ 1922.245092][ C1] raw_notifier_call_chain+0x37/0x50 [ 1922.250369][ C1] call_netdevice_notifiers_info+0x9a/0x120 [ 1922.256252][ C1] netdev_state_change+0xb2/0xd0 [ 1922.261178][ C1] do_setlink+0xdf2/0x1ee0 [ 1922.265577][ C1] __rtnl_newlink+0xa86/0x1090 [ 1922.270322][ C1] rtnl_newlink+0x63/0x90 [ 1922.274634][ C1] rtnetlink_rcv_msg+0x1d3/0x500 [ 1922.279560][ C1] netlink_rcv_skb+0xb0/0x260 [ 1922.284222][ C1] rtnetlink_rcv+0x26/0x30 [ 1922.288624][ C1] netlink_unicast+0x3a6/0x4d0 [ 1922.293372][ C1] netlink_sendmsg+0x4d3/0x8b0 [ 1922.298133][ C1] sock_sendmsg+0x9f/0xc0 [ 1922.302457][ C1] ____sys_sendmsg+0x49d/0x4d0 [ 1922.307219][ C1] ___sys_sendmsg+0xb5/0x100 [ 1922.311808][ C1] __sys_sendmsg+0xa0/0x160 [ 1922.316298][ C1] __x64_sys_sendmsg+0x51/0x70 [ 1922.321048][ C1] do_syscall_64+0xcc/0x3a0 [ 1922.325537][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1922.331402][ C1] [ 1922.333711][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1922.339853][ C1] CPU: 1 PID: 14713 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1922.348523][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.358559][ C1] ================================================================== [ 1922.366602][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 1922.373173][ C1] CPU: 1 PID: 14713 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1922.381819][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.391853][ C1] Call Trace: [ 1922.395137][ C1] [ 1922.397978][ C1] dump_stack+0x11d/0x181 [ 1922.402296][ C1] panic+0x210/0x640 [ 1922.406208][ C1] ? vprintk_func+0x8d/0x140 [ 1922.410798][ C1] kcsan_report.cold+0xc/0xd [ 1922.415375][ C1] kcsan_setup_watchpoint+0x3fe/0x460 [ 1922.420732][ C1] __tsan_unaligned_write8+0xc7/0x110 [ 1922.426110][ C1] ___neigh_create+0x994/0x1230 [ 1922.430954][ C1] ? __this_cpu_preempt_check+0x20/0x140 [ 1922.436602][ C1] __neigh_create+0x38/0x50 [ 1922.441095][ C1] ip6_finish_output2+0x6cb/0xf60 [ 1922.446107][ C1] ? __rcu_read_unlock+0x66/0x3d0 [ 1922.451126][ C1] ? netif_rx_ni+0x290/0x290 [ 1922.455705][ C1] __ip6_finish_output+0x2d7/0x330 [ 1922.460804][ C1] ip6_finish_output+0x41/0x160 [ 1922.465640][ C1] ip6_output+0x108/0x290 [ 1922.469960][ C1] ? __ip6_finish_output+0x330/0x330 [ 1922.475235][ C1] igmp6_send+0x639/0x6f0 [ 1922.479562][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.485794][ C1] igmp6_timer_handler+0x72/0xf0 [ 1922.490739][ C1] ? ma_put+0x130/0x130 [ 1922.494886][ C1] call_timer_fn+0x5f/0x2f0 [ 1922.499374][ C1] ? ma_put+0x130/0x130 [ 1922.503525][ C1] ? ma_put+0x130/0x130 [ 1922.507671][ C1] run_timer_softirq+0xc0c/0xcd0 [ 1922.512595][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 1922.517689][ C1] ? sched_clock+0x13/0x20 [ 1922.522085][ C1] ? sched_clock_cpu+0x15/0xe0 [ 1922.526838][ C1] __do_softirq+0x115/0x33f [ 1922.531330][ C1] ? fib6_ifup+0x100/0x100 [ 1922.535734][ C1] do_softirq_own_stack+0x2a/0x40 [ 1922.540736][ C1] [ 1922.543661][ C1] do_softirq.part.0+0x6b/0x80 [ 1922.548417][ C1] __local_bh_enable_ip+0x76/0x80 [ 1922.553432][ C1] _raw_spin_unlock_bh+0x3f/0x50 [ 1922.558356][ C1] __fib6_clean_all+0xc5/0x150 [ 1922.563104][ C1] ? fib6_ifup+0x100/0x100 [ 1922.567503][ C1] fib6_clean_all+0x34/0x50 [ 1922.571990][ C1] rt6_sync_down_dev+0xd0/0xe0 [ 1922.576738][ C1] addrconf_notify+0xe25/0x1550 [ 1922.581653][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.587872][ C1] ? __this_cpu_preempt_check+0x45/0x140 [ 1922.593494][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.599830][ C1] ? ip6mr_device_event+0x51/0x1a0 [ 1922.604930][ C1] notifier_call_chain+0xd7/0x160 [ 1922.609944][ C1] ? notifier_call_chain+0xd7/0x160 [ 1922.615128][ C1] raw_notifier_call_chain+0x37/0x50 [ 1922.620402][ C1] call_netdevice_notifiers_info+0x9a/0x120 [ 1922.626277][ C1] netdev_state_change+0xb2/0xd0 [ 1922.631203][ C1] do_setlink+0xdf2/0x1ee0 [ 1922.635613][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1922.641499][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.647833][ C1] ? __nla_validate_parse+0xa0/0x1140 [ 1922.653194][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.659420][ C1] ? debug_smp_processor_id+0x43/0x137 [ 1922.664864][ C1] ? delay_tsc+0x8f/0xc0 [ 1922.669093][ C1] ? __const_udelay+0x36/0x40 [ 1922.673762][ C1] ? __udelay+0x10/0x20 [ 1922.677905][ C1] __rtnl_newlink+0xa86/0x1090 [ 1922.682667][ C1] ? cgroup_rstat_updated+0xbe/0x1e0 [ 1922.687944][ C1] ? __rcu_read_unlock+0x66/0x3d0 [ 1922.692956][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.699182][ C1] ? __list_del_entry_valid+0x86/0x93 [ 1922.704545][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1922.710426][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.716673][ C1] ? kmem_cache_alloc_trace+0x1b0/0x5d0 [ 1922.722297][ C1] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1922.728295][ C1] ? __rtnl_newlink+0x1090/0x1090 [ 1922.733305][ C1] rtnl_newlink+0x63/0x90 [ 1922.737625][ C1] rtnetlink_rcv_msg+0x1d3/0x500 [ 1922.742566][ C1] ? __rcu_read_unlock+0x66/0x3d0 [ 1922.747580][ C1] netlink_rcv_skb+0xb0/0x260 [ 1922.752244][ C1] ? rtnl_calcit.isra.0+0x220/0x220 [ 1922.757431][ C1] rtnetlink_rcv+0x26/0x30 [ 1922.761836][ C1] netlink_unicast+0x3a6/0x4d0 [ 1922.766588][ C1] netlink_sendmsg+0x4d3/0x8b0 [ 1922.771345][ C1] ? netlink_unicast+0x4d0/0x4d0 [ 1922.776273][ C1] sock_sendmsg+0x9f/0xc0 [ 1922.780630][ C1] ____sys_sendmsg+0x49d/0x4d0 [ 1922.785389][ C1] ___sys_sendmsg+0xb5/0x100 [ 1922.789973][ C1] ? __fget+0xb8/0x1d0 [ 1922.794055][ C1] ? __fget_light+0xaf/0x190 [ 1922.798637][ C1] ? __fdget+0x2c/0x40 [ 1922.802709][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.808931][ C1] __sys_sendmsg+0xa0/0x160 [ 1922.813420][ C1] __x64_sys_sendmsg+0x51/0x70 [ 1922.818187][ C1] do_syscall_64+0xcc/0x3a0 [ 1922.822684][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1922.828558][ C1] RIP: 0033:0x45aff9 [ 1922.832453][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.852038][ C1] RSP: 002b:00007f46e601ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1922.860434][ C1] RAX: ffffffffffffffda RBX: 00007f46e601f6d4 RCX: 000000000045aff9 [ 1922.868389][ C1] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000007 [ 1922.876357][ C1] RBP: 000000000075c1c0 R08: 0000000000000000 R09: 0000000000000000 [ 1922.884312][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1922.892267][ C1] R13: 0000000000000988 R14: 00000000004cac40 R15: 000000000075c1cc [ 1922.901443][ C1] Kernel Offset: disabled [ 1922.905760][ C1] Rebooting in 86400 seconds..