e_1) entered forwarding state [ 341.532379] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.538813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.546155] device bridge0 entered promiscuous mode [ 341.555904] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.562509] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:07 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f0000000900)=0x1193) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 341.579811] device bridge0 left promiscuous mode 18:41:07 executing program 4 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:07 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 341.760274] FAULT_INJECTION: forcing a failure. [ 341.760274] name failslab, interval 1, probability 0, space 0, times 0 [ 341.803674] CPU: 0 PID: 14106 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 341.812236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.821644] Call Trace: [ 341.824274] dump_stack+0x1d3/0x2c4 [ 341.827949] ? dump_stack_print_info.cold.2+0x52/0x52 [ 341.833228] ? find_held_lock+0x36/0x1c0 [ 341.837348] should_fail.cold.4+0xa/0x17 [ 341.841446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.846582] ? graph_lock+0x170/0x170 [ 341.850401] ? current_time+0x72/0x1b0 [ 341.854317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.859969] ? timespec64_trunc+0xea/0x180 [ 341.864224] ? inode_init_owner+0x340/0x340 [ 341.868576] ? find_held_lock+0x36/0x1c0 [ 341.872681] ? ttwu_stat+0x5c0/0x5c0 [ 341.876423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.881995] __should_failslab+0x124/0x180 [ 341.886254] should_failslab+0x9/0x14 [ 341.890075] kmem_cache_alloc+0x2be/0x730 [ 341.894248] ? do_sys_ftruncate+0x428/0x550 [ 341.898600] ? lock_downgrade+0x900/0x900 [ 341.902791] getname_flags+0xd0/0x590 [ 341.906617] ? __lock_is_held+0xb5/0x140 [ 341.910703] getname+0x19/0x20 [ 341.913916] do_sys_open+0x383/0x700 [ 341.917650] ? filp_open+0x80/0x80 [ 341.921215] ? trace_hardirqs_off_caller+0x300/0x300 [ 341.926347] ? do_sys_ftruncate+0x449/0x550 [ 341.930700] __x64_sys_open+0x7e/0xc0 [ 341.934533] do_syscall_64+0x1b9/0x820 [ 341.938477] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 341.943885] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.948853] ? trace_hardirqs_off+0x310/0x310 [ 341.953383] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 341.958435] ? recalc_sigpending_tsk+0x180/0x180 [ 341.963239] ? kasan_check_write+0x14/0x20 [ 341.967521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.972410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.977622] RIP: 0033:0x4112d1 [ 341.980835] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 341.999791] RSP: 002b:00007f9a03e58a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 342.007548] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004112d1 [ 342.014840] RDX: 00007f9a03e58afa RSI: 0000000000000002 RDI: 00007f9a03e58af0 [ 342.022187] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.029480] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 342.036773] R13: 0000000000000000 R14: 00000000004c4a7f R15: 0000000000000005 [ 342.037509] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.050655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.057373] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.063888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.071278] device bridge0 entered promiscuous mode 18:41:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000300)={0x7f}) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000140)=[{}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = geteuid() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x6, &(0x7f0000000700)=[{&(0x7f0000000080)="2ba7", 0x2, 0x6}, {&(0x7f00000000c0)="a6b4103f2e66acabeb81e8393f5bff4977c206773ebe287a5b1e0103cb94ca559396831ac20ac6137fbb9cfdff4ca5c0831c288ef81955d21b7369d5fc7505032af369c6209733d35128e540a66925a4149300cb0b46ea9b4d62b27a30c871cb5d06a540a042083aa3e387569cd259b31a1856ad140e2156118e0159", 0x7c, 0x7}, {&(0x7f0000000280)="f26c06e84c700ba15ee967728721b0a4609d56194e926c5cd6b8b9160d4a3350dd83715fcf8063da192c0c3010782d36d7fe97b5df0045acd2aab5d57b73cc2d7429ca22dcfef06b0fe05c68909f8225204314e5abfa5f541123fc7ca2341a93232ede384b8cbedfed9c6b5f1b4d1e71748a916cbdedcec822e1c3d36b20417676959f1f0e05fcd9e7edcd8557550de425d3caf731cba9157558ddc7e35951cf952e559df7b53e54688760a371da23a288bd93e3bc6999c8c4204fb0758f4edce08db8a20bd5ee7a59009560f9af1519c02f3a", 0xd3, 0x7fff}, {&(0x7f0000000380)="36040d667fc8fcbcbcc28063b1b4edb5969c6b96e42848f1cba4f39e8f900b48eb3e0d4c9996586e245158853f0e92b4da54f728642d1362ce21c595c639db8af8ba190aa6b33d887968537b1531a8710688babc352875d47efdb6441212173f81a3eef156fc9612a7ae3405a8ae3334", 0x70, 0x6a4}, {&(0x7f0000000480)="7e35d960071ce1db209db97a5f302b4188d2cb2efc77ba1045dfe8b5d939c7146195f0e79e3f6ed14a5fc5dab2c8c5bba9559b2b12778225f7529b428285a90068e07b85adf1d7765088fcc6734dfaea56386e11764dbd07b17fa367d2691cb5670102ae69df40bf53278169c79fac05c39903fefe2eb94f0b5a94428fe34afcda953971d01107aebf544827dbe632def2384f489a70e8f80a84a53ef07618dbc3832f457e42492c208559eeee5b708640f19edc35cccb08679c44b3eb2b8a97ba2e82b41495decebdbd48fc60e7b4f706", 0xd1, 0x10000}, {&(0x7f0000000600)="15ed9dd9d5dc1bceabdea373ce0d2dfa5c7830af7762850ce1e46bca5a99f99c05641ded2436af8dcef5d3da13d7aa3e161f3ba8a2db72dc1e41d28f3d9180803b1094aec3989d5f8b84440ac1ee6123625a14a9b92aef7bc2fd18aeb79b07225d5d8f92c80a677b0051018eeb4f526b7c66655f84996b78c1d8ee3e905a9b71cc10ac1f475a3e675b6b8e1982d79ad5ad81a01df5da94549d6e0e842d5f31c8b213d5858d7acde67bc6d16a4efac681ef33619ee946d5c18207f727671492e428131e0db1dbf467902c107dca39c7a0b2fadbe82c562f2c0a90e9f01d6dcfa843edd2ab", 0xe4, 0x9}], 0x1040421, &(0x7f00000007c0)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@uid={'uid', 0x3d, r1}}, {@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}]}) 18:41:08 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f0000000900)=0x1193) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:08 executing program 4 (fault-call:2 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 342.127933] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.136072] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.155525] device bridge0 left promiscuous mode 18:41:08 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 342.590958] FAULT_INJECTION: forcing a failure. [ 342.590958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 342.602834] CPU: 1 PID: 14132 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 342.611365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.620749] Call Trace: [ 342.623372] dump_stack+0x1d3/0x2c4 [ 342.627036] ? dump_stack_print_info.cold.2+0x52/0x52 [ 342.632276] should_fail.cold.4+0xa/0x17 [ 342.636391] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.641537] ? debug_smp_processor_id+0x1c/0x20 [ 342.646255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.651840] ? check_preemption_disabled+0x48/0x200 [ 342.656920] ? mark_held_locks+0x130/0x130 [ 342.661192] ? print_usage_bug+0xc0/0xc0 [ 342.665286] ? graph_lock+0x170/0x170 [ 342.669106] ? check_preemption_disabled+0x48/0x200 [ 342.674152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.679719] ? check_preemption_disabled+0x48/0x200 [ 342.684774] ? debug_smp_processor_id+0x1c/0x20 [ 342.689469] ? perf_trace_lock_acquire+0x15b/0x800 [ 342.694426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.699996] ? should_fail+0x22d/0xd01 [ 342.703914] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.709058] __alloc_pages_nodemask+0x34b/0xdd0 [ 342.713767] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 342.718826] ? inode_init_owner+0x340/0x340 [ 342.723197] ? find_held_lock+0x36/0x1c0 [ 342.727313] ? trace_hardirqs_off+0xb8/0x310 [ 342.731751] cache_grow_begin+0x91/0x8c0 [ 342.735834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.741408] ? check_preemption_disabled+0x48/0x200 [ 342.746452] kmem_cache_alloc+0x665/0x730 [ 342.750634] ? do_sys_ftruncate+0x428/0x550 [ 342.755004] getname_flags+0xd0/0x590 [ 342.758827] ? __lock_is_held+0xb5/0x140 [ 342.762929] getname+0x19/0x20 [ 342.766151] do_sys_open+0x383/0x700 [ 342.769915] ? filp_open+0x80/0x80 [ 342.773529] ? trace_hardirqs_off_caller+0x300/0x300 [ 342.778683] ? do_sys_ftruncate+0x449/0x550 [ 342.783055] __x64_sys_open+0x7e/0xc0 [ 342.786903] do_syscall_64+0x1b9/0x820 [ 342.790818] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 342.796218] ? syscall_return_slowpath+0x5e0/0x5e0 [ 342.801201] ? trace_hardirqs_off+0x310/0x310 [ 342.805721] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 342.810759] ? recalc_sigpending_tsk+0x180/0x180 [ 342.815540] ? kasan_check_write+0x14/0x20 [ 342.819804] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.824695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.829903] RIP: 0033:0x4112d1 [ 342.833112] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 342.852035] RSP: 002b:00007f9a03e58a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 342.859801] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004112d1 [ 342.867100] RDX: 00007f9a03e58afa RSI: 0000000000000002 RDI: 00007f9a03e58af0 [ 342.874397] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.881697] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 342.889000] R13: 0000000000000000 R14: 00000000004c4a7f R15: 0000000000000006 [ 342.898593] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.905107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.911985] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.918408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.941368] hfsplus: creator requires a 4 character value [ 342.946956] hfsplus: unable to parse mount options [ 342.965544] device bridge0 entered promiscuous mode [ 342.977641] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.984403] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:09 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f0000000900)=0x1193) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff, r9}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r10}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r11 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r11, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 343.004520] device bridge0 left promiscuous mode 18:41:09 executing program 4 (fault-call:2 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 343.306468] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.313038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.319787] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.326207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.333919] device bridge0 entered promiscuous mode 18:41:09 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:09 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext={0x1000, 0x1000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x100, 0x4000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000300)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) write$P9_RSYMLINK(r2, &(0x7f0000000200)={0x14, 0x11, 0x1, {0x8, 0x0, 0x3}}, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='tagemap\x00') syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x1, 0x2) setsockopt$inet_opts(r3, 0x0, 0x9, &(0x7f0000000240)="b89d8eab9c6019f8081463790779cd857cb86a088564f79d935731db737029b0719551120a8c7eb089a45203101c46fb67747989b9e0a0f3db0e4c86ff291dbc044830a5c969759ce3ec553c3cd4888d8f3198799d88c2355fd86e1301dcdd6730bffd001201da82955c9ff1d3b9f95f70042a471d895ddafaaa3da3b0f5887cecc8480bcc113601d06ead68757a6b57053cb014d1526dea32e5bf9035a7", 0x9e) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x2) 18:41:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002646ff316757aa6589ddd87c552d5603d3d336617e21cc16cb9699ec2554a117bd588a0684aa51cf18587b910179aa82467b4845f8cc96d0af5f"], @ANYBLOB="000000a19826cc01fe672d0756d00000000000000000000000000000000000000000000000000000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x9) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 343.382618] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.390618] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.416032] device bridge0 left promiscuous mode [ 343.500808] FAULT_INJECTION: forcing a failure. [ 343.500808] name failslab, interval 1, probability 0, space 0, times 0 [ 343.527527] CPU: 0 PID: 14159 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 343.536119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.545512] Call Trace: [ 343.548146] dump_stack+0x1d3/0x2c4 [ 343.551807] ? dump_stack_print_info.cold.2+0x52/0x52 [ 343.557048] should_fail.cold.4+0xa/0x17 [ 343.561136] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.566273] ? graph_lock+0x170/0x170 [ 343.570091] ? check_preemption_disabled+0x48/0x200 [ 343.575128] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 343.580075] ? kasan_check_read+0x11/0x20 [ 343.584256] ? find_held_lock+0x36/0x1c0 [ 343.588365] ? ttwu_stat+0x5c0/0x5c0 [ 343.592114] __should_failslab+0x124/0x180 [ 343.596363] should_failslab+0x9/0x14 [ 343.600181] kmem_cache_alloc+0x2be/0x730 [ 343.604342] ? graph_lock+0x170/0x170 [ 343.608156] ? mark_held_locks+0x130/0x130 [ 343.612438] __alloc_file+0xa8/0x470 [ 343.616171] ? file_free_rcu+0xd0/0xd0 [ 343.620081] ? find_held_lock+0x36/0x1c0 [ 343.624172] ? is_bpf_text_address+0xac/0x170 [ 343.628685] ? lock_downgrade+0x900/0x900 [ 343.632855] ? check_preemption_disabled+0x48/0x200 [ 343.637898] alloc_empty_file+0x72/0x170 [ 343.641981] path_openat+0x170/0x5160 [ 343.645798] ? rcu_softirq_qs+0x20/0x20 [ 343.649784] ? unwind_dump+0x190/0x190 [ 343.653704] ? __lock_is_held+0xb5/0x140 [ 343.657780] ? graph_lock+0x170/0x170 [ 343.661603] ? path_lookupat.isra.43+0xc00/0xc00 [ 343.666369] ? unwind_get_return_address+0x61/0xa0 [ 343.671316] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 343.676353] ? expand_files.part.8+0x571/0x9a0 [ 343.680964] ? find_held_lock+0x36/0x1c0 [ 343.685050] ? __alloc_fd+0x347/0x6e0 [ 343.688876] ? lock_downgrade+0x900/0x900 [ 343.693039] ? getname+0x19/0x20 [ 343.696428] ? kasan_check_read+0x11/0x20 [ 343.700588] ? do_raw_spin_unlock+0xa7/0x2f0 [ 343.705012] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 343.709611] ? __lock_is_held+0xb5/0x140 [ 343.713702] ? _raw_spin_unlock+0x2c/0x50 [ 343.717871] ? __alloc_fd+0x347/0x6e0 [ 343.721711] do_filp_open+0x255/0x380 [ 343.725526] ? may_open_dev+0x100/0x100 [ 343.729532] ? get_unused_fd_flags+0x122/0x1a0 [ 343.734128] ? __alloc_fd+0x6e0/0x6e0 [ 343.737951] ? __lock_is_held+0xb5/0x140 [ 343.742043] do_sys_open+0x568/0x700 [ 343.745777] ? filp_open+0x80/0x80 [ 343.749335] ? trace_hardirqs_off_caller+0x300/0x300 [ 343.754453] ? do_sys_ftruncate+0x449/0x550 [ 343.758802] __x64_sys_open+0x7e/0xc0 [ 343.762626] do_syscall_64+0x1b9/0x820 [ 343.766525] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 343.771917] ? syscall_return_slowpath+0x5e0/0x5e0 [ 343.776879] ? trace_hardirqs_off+0x310/0x310 [ 343.781393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 343.786425] ? recalc_sigpending_tsk+0x180/0x180 [ 343.791197] ? kasan_check_write+0x14/0x20 [ 343.795460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.800330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.805529] RIP: 0033:0x4112d1 [ 343.808734] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 343.827653] RSP: 002b:00007f9a03e58a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 343.835391] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004112d1 [ 343.842669] RDX: 00007f9a03e58afa RSI: 0000000000000002 RDI: 00007f9a03e58af0 [ 343.849967] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 343.857246] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 343.864524] R13: 0000000000000000 R14: 00000000004c4a7f R15: 0000000000000007 18:41:10 executing program 4 (fault-call:2 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 344.258209] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.264681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.271477] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.277881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.284761] device bridge0 entered promiscuous mode 18:41:10 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000140)='./bus\x00', r0}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r2 = gettid() getpid() fcntl$setown(0xffffffffffffffff, 0x8, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r3, 0xd937}, &(0x7f0000001ec0)=0x8) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb284f8fc67dc7859972aabff") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000680)={0x0, 0x3, 0xa7e}, 0x8) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f0000001a00)=""/128, 0x80}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f0000001f00)={0x2, 0x4e20, @rand_addr=0xe06}, 0x10) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x9) fallocate(r1, 0x40080000004, 0x55c1d054, 0x1001000f4) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 18:41:10 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000900)=0x1193) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000140)=""/44) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000004c0)={0x8, 0x9, 0xb325, 'queue0\x00', 0xffffffffffff657f}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000001c0)={0x8001, 0x3, 'client1\x00', 0x1, "2aa52bcf7ace58da", "0daac4ae481b9d9d6c8ff89b3104105d3ffe72a6056c18b72d94e4805b15e64a", 0x101, 0x8}) [ 344.416907] FAULT_INJECTION: forcing a failure. [ 344.416907] name failslab, interval 1, probability 0, space 0, times 0 [ 344.458645] CPU: 1 PID: 14172 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 344.467202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.476581] Call Trace: [ 344.479197] dump_stack+0x1d3/0x2c4 [ 344.482869] ? dump_stack_print_info.cold.2+0x52/0x52 [ 344.488107] should_fail.cold.4+0xa/0x17 [ 344.492205] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.497365] ? graph_lock+0x170/0x170 [ 344.501188] ? kernel_text_address+0x79/0xf0 [ 344.505615] ? __kernel_text_address+0xd/0x40 [ 344.510133] ? unwind_get_return_address+0x61/0xa0 [ 344.515091] ? find_held_lock+0x36/0x1c0 [ 344.519176] ? ttwu_stat+0x5c0/0x5c0 [ 344.522927] __should_failslab+0x124/0x180 [ 344.527183] should_failslab+0x9/0x14 [ 344.530993] kmem_cache_alloc_trace+0x2d7/0x750 [ 344.535692] ? __might_sleep+0x95/0x190 [ 344.539721] apparmor_file_alloc_security+0x17b/0xac0 [ 344.544931] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 344.550502] ? apparmor_socket_getpeersec_stream+0xae0/0xae0 [ 344.556373] ? rcu_read_lock_sched_held+0x108/0x120 [ 344.561414] ? kmem_cache_alloc+0x33a/0x730 [ 344.565765] security_file_alloc+0x4c/0xa0 [ 344.570019] __alloc_file+0x12a/0x470 [ 344.573837] ? file_free_rcu+0xd0/0xd0 [ 344.577755] ? find_held_lock+0x36/0x1c0 [ 344.581855] ? is_bpf_text_address+0xac/0x170 [ 344.586380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.591942] ? check_preemption_disabled+0x48/0x200 [ 344.596987] alloc_empty_file+0x72/0x170 [ 344.601072] path_openat+0x170/0x5160 [ 344.604899] ? perf_trace_lock+0x7a0/0x7a0 [ 344.609175] ? __lock_is_held+0xb5/0x140 [ 344.613256] ? graph_lock+0x170/0x170 [ 344.617080] ? path_lookupat.isra.43+0xc00/0xc00 [ 344.621871] ? unwind_get_return_address+0x61/0xa0 [ 344.626825] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 344.631882] ? expand_files.part.8+0x571/0x9a0 [ 344.636498] ? find_held_lock+0x36/0x1c0 [ 344.640595] ? __alloc_fd+0x347/0x6e0 [ 344.644422] ? lock_downgrade+0x900/0x900 [ 344.648603] ? kasan_check_read+0x11/0x20 [ 344.652764] ? do_raw_spin_unlock+0xa7/0x2f0 18:41:10 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000140)='./bus\x00', r0}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r2 = gettid() getpid() fcntl$setown(0xffffffffffffffff, 0x8, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r3, 0xd937}, &(0x7f0000001ec0)=0x8) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb284f8fc67dc7859972aabff") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000680)={0x0, 0x3, 0xa7e}, 0x8) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f0000001a00)=""/128, 0x80}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f0000001f00)={0x2, 0x4e20, @rand_addr=0xe06}, 0x10) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x9) fallocate(r1, 0x40080000004, 0x55c1d054, 0x1001000f4) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) [ 344.657191] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 344.661829] ? __lock_is_held+0xb5/0x140 [ 344.665924] ? _raw_spin_unlock+0x2c/0x50 [ 344.670084] ? __alloc_fd+0x347/0x6e0 [ 344.673915] do_filp_open+0x255/0x380 [ 344.677725] ? may_open_dev+0x100/0x100 [ 344.681704] ? get_unused_fd_flags+0x122/0x1a0 [ 344.686282] ? __alloc_fd+0x6e0/0x6e0 [ 344.690088] ? __lock_is_held+0xb5/0x140 [ 344.694163] do_sys_open+0x568/0x700 [ 344.697893] ? filp_open+0x80/0x80 [ 344.701430] ? trace_hardirqs_off_caller+0x300/0x300 [ 344.706526] ? do_sys_ftruncate+0x449/0x550 [ 344.710869] __x64_sys_open+0x7e/0xc0 [ 344.714682] do_syscall_64+0x1b9/0x820 [ 344.718568] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 344.723954] ? syscall_return_slowpath+0x5e0/0x5e0 [ 344.728897] ? trace_hardirqs_off+0x310/0x310 [ 344.733404] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 344.738439] ? recalc_sigpending_tsk+0x180/0x180 [ 344.743206] ? kasan_check_write+0x14/0x20 [ 344.747446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.752291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.757477] RIP: 0033:0x4112d1 [ 344.760670] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 344.779571] RSP: 002b:00007f9a03e79a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 344.787293] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004112d1 [ 344.794587] RDX: 00007f9a03e79afa RSI: 0000000000000002 RDI: 00007f9a03e79af0 [ 344.801892] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 18:41:10 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = dup2(0xffffffffffffffff, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r2, &(0x7f0000000340)={0x8001}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd245, 0x0, 0x0, 0x200, 0x0, 0x0, 0x3fffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0) keyctl$setperm(0x5, r5, 0x2000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xe}, 0x1}}, 0xcf, 0xd2d, 0xa0, 0x80, 0x9}, &(0x7f0000000140)=0x98) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000480)={0xfffffffffffff640, 0x7ff, 0x4, 0x0, 0x0, [{r2, 0x0, 0x1ff}, {r1, 0x0, 0x3f}, {r0, 0x0, 0x20}, {r2, 0x0, 0x7ff}]}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES32=r3], @ANYBLOB="0900040001000900040002001128de263eafab3ca38d1fe03a0d034aa281dbf4e75276a289fdc066adfd8ef01a84b0c0ed8426f320e12137f30c32d7e401235f0ac0ee3c0ba5bbb811c66936a1b4b9db033fc981609d4e70a2"], &(0x7f0000000280)=0x2) [ 344.809183] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 344.816482] R13: 0000000000000000 R14: 00000000004c4a7f R15: 0000000000000008 [ 344.825631] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.833341] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.852232] device bridge0 left promiscuous mode 18:41:10 executing program 4 (fault-call:2 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 345.086291] FAULT_INJECTION: forcing a failure. [ 345.086291] name failslab, interval 1, probability 0, space 0, times 0 [ 345.122594] CPU: 0 PID: 14199 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 345.131159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.140563] Call Trace: [ 345.143190] dump_stack+0x1d3/0x2c4 [ 345.146867] ? dump_stack_print_info.cold.2+0x52/0x52 [ 345.152110] should_fail.cold.4+0xa/0x17 [ 345.156229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.161369] ? graph_lock+0x170/0x170 [ 345.165204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.170770] ? check_preemption_disabled+0x48/0x200 [ 345.175811] ? graph_lock+0x170/0x170 [ 345.179654] ? debug_smp_processor_id+0x1c/0x20 [ 345.184356] ? perf_trace_lock_acquire+0x15b/0x800 [ 345.189309] ? find_held_lock+0x36/0x1c0 [ 345.193404] ? __lock_is_held+0xb5/0x140 [ 345.197505] ? ttwu_stat+0x5c0/0x5c0 [ 345.201257] __should_failslab+0x124/0x180 [ 345.205518] should_failslab+0x9/0x14 [ 345.209332] kmem_cache_alloc_trace+0x2d7/0x750 [ 345.214038] ? check_preemption_disabled+0x48/0x200 [ 345.219100] __kthread_create_on_node+0x137/0x540 [ 345.223974] ? loop_get_status64+0x140/0x140 [ 345.228408] ? __kthread_parkme+0x1a0/0x1a0 [ 345.232782] ? __lockdep_init_map+0x105/0x590 [ 345.237310] ? __lockdep_init_map+0x105/0x590 [ 345.241829] ? loop_get_status64+0x140/0x140 [ 345.246267] kthread_create_on_node+0xb1/0xe0 [ 345.250789] ? __kthread_create_on_node+0x540/0x540 [ 345.255835] ? graph_lock+0x170/0x170 [ 345.259682] lo_ioctl+0x7f6/0x1d80 [ 345.263260] ? lo_rw_aio_complete+0x470/0x470 [ 345.267783] blkdev_ioctl+0x9ac/0x2010 [ 345.271704] ? blkpg_ioctl+0xc10/0xc10 [ 345.275617] ? lock_downgrade+0x900/0x900 [ 345.279785] ? check_preemption_disabled+0x48/0x200 [ 345.284829] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 345.289796] ? kasan_check_read+0x11/0x20 [ 345.293963] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 345.299257] ? rcu_softirq_qs+0x20/0x20 [ 345.303268] ? __fget+0x4d1/0x740 [ 345.306756] ? ksys_dup3+0x680/0x680 [ 345.310495] ? kasan_check_write+0x14/0x20 [ 345.314758] block_ioctl+0xee/0x130 [ 345.318396] ? blkdev_fallocate+0x400/0x400 [ 345.322740] do_vfs_ioctl+0x1de/0x1720 [ 345.326653] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 345.332228] ? ioctl_preallocate+0x300/0x300 [ 345.336685] ? __fget_light+0x2e9/0x430 [ 345.340712] ? fget_raw+0x20/0x20 [ 345.344197] ? rcu_read_lock_sched_held+0x108/0x120 [ 345.349243] ? kmem_cache_free+0x24f/0x290 [ 345.353506] ? putname+0xf7/0x130 [ 345.356981] ? do_syscall_64+0x9a/0x820 [ 345.360972] ? do_syscall_64+0x9a/0x820 [ 345.364970] ? lockdep_hardirqs_on+0x421/0x5c0 [ 345.369579] ? security_file_ioctl+0x94/0xc0 [ 345.374013] ksys_ioctl+0xa9/0xd0 [ 345.377491] __x64_sys_ioctl+0x73/0xb0 [ 345.381410] do_syscall_64+0x1b9/0x820 [ 345.385319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 345.390707] ? syscall_return_slowpath+0x5e0/0x5e0 [ 345.395661] ? trace_hardirqs_off+0x310/0x310 [ 345.400196] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 345.405243] ? recalc_sigpending_tsk+0x180/0x180 [ 345.410021] ? kasan_check_write+0x14/0x20 [ 345.414306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.419198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.424409] RIP: 0033:0x4574e7 [ 345.427622] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.446571] RSP: 002b:00007f9a03e58a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.454354] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004574e7 [ 345.461648] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 345.468939] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 345.476236] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 18:41:11 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5c858a72d24680715070") r2 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x4}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0xffff0000, 0x1a, 0x1700, {0x0, &(0x7f0000000280), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x20) [ 345.483530] R13: 0000000000000000 R14: 00000000004c4a7f R15: 0000000000000009 18:41:11 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 345.612624] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.619121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.625921] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.632355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.639308] device bridge0 entered promiscuous mode 18:41:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000140)) 18:41:11 executing program 4 (fault-call:2 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x100000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="480000001400199009004b0101048c01010000ebbd2e2ab9f5440000632379eb000000000000551f5f0028213ee20607000000000000003f666674a8ffff00c7e5ed5e00000000c8", 0x48}], 0x1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000040)={0x80000000, 0x4, 0x5}) 18:41:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0xcd, &(0x7f0000000dc0)="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", 0x1000) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/27, 0x1b) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) [ 345.801356] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.807942] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.845454] device bridge0 left promiscuous mode [ 345.879141] FAULT_INJECTION: forcing a failure. [ 345.879141] name failslab, interval 1, probability 0, space 0, times 0 [ 345.895183] CPU: 1 PID: 14227 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 345.903712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.913086] Call Trace: [ 345.915713] dump_stack+0x1d3/0x2c4 [ 345.919376] ? dump_stack_print_info.cold.2+0x52/0x52 [ 345.924611] should_fail.cold.4+0xa/0x17 [ 345.928714] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.933858] ? pick_next_task_fair+0xa03/0x1c20 [ 345.938561] ? rcu_read_lock_sched_held+0x108/0x120 [ 345.943612] ? rcu_note_context_switch+0x12de/0x2150 [ 345.948781] ? graph_lock+0x170/0x170 [ 345.952621] ? __lock_acquire+0x7ec/0x4ec0 [ 345.956933] ? graph_lock+0x170/0x170 [ 345.960759] ? print_usage_bug+0xc0/0xc0 [ 345.964838] ? __account_cfs_rq_runtime+0x790/0x790 [ 345.969899] ? find_held_lock+0x36/0x1c0 [ 345.973988] ? __lock_is_held+0xb5/0x140 [ 345.978083] ? ttwu_stat+0x5c0/0x5c0 [ 345.981826] __should_failslab+0x124/0x180 [ 345.986524] should_failslab+0x9/0x14 [ 345.990340] kmem_cache_alloc+0x2be/0x730 [ 345.994510] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 345.999552] __kernfs_new_node+0x127/0x8d0 [ 346.003811] ? trace_hardirqs_off_caller+0x300/0x300 [ 346.008947] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 346.013732] ? _raw_spin_unlock_irq+0x60/0x80 [ 346.018272] ? __schedule+0x150c/0x1ed0 [ 346.022276] ? graph_lock+0x170/0x170 [ 346.026092] ? graph_lock+0x170/0x170 [ 346.029916] ? trace_hardirqs_on+0xbd/0x310 [ 346.034251] ? kasan_check_read+0x11/0x20 [ 346.038424] ? find_held_lock+0x36/0x1c0 [ 346.042516] kernfs_new_node+0x95/0x120 [ 346.046515] kernfs_create_dir_ns+0x4d/0x160 [ 346.050947] internal_create_group+0x5fc/0xd80 [ 346.055566] ? remove_files.isra.1+0x190/0x190 [ 346.060164] ? up_write+0x7b/0x220 [ 346.063728] ? down_write_nested+0x130/0x130 [ 346.068154] ? down_read+0x120/0x120 [ 346.071913] sysfs_create_group+0x1f/0x30 [ 346.076090] lo_ioctl+0x1310/0x1d80 [ 346.079761] ? lo_rw_aio_complete+0x470/0x470 [ 346.084292] blkdev_ioctl+0x9ac/0x2010 [ 346.088214] ? blkpg_ioctl+0xc10/0xc10 [ 346.092133] ? lock_downgrade+0x900/0x900 [ 346.096300] ? check_preemption_disabled+0x48/0x200 [ 346.101339] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 346.106281] ? kasan_check_read+0x11/0x20 [ 346.110448] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 346.115747] ? rcu_softirq_qs+0x20/0x20 [ 346.119751] ? __fget+0x4d1/0x740 [ 346.123227] ? ksys_dup3+0x680/0x680 [ 346.126960] ? kasan_check_write+0x14/0x20 [ 346.131218] block_ioctl+0xee/0x130 [ 346.134868] ? blkdev_fallocate+0x400/0x400 [ 346.139209] do_vfs_ioctl+0x1de/0x1720 [ 346.143118] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 346.148692] ? ioctl_preallocate+0x300/0x300 [ 346.153134] ? __fget_light+0x2e9/0x430 [ 346.157138] ? fget_raw+0x20/0x20 [ 346.160619] ? rcu_read_lock_sched_held+0x108/0x120 [ 346.165661] ? kmem_cache_free+0x24f/0x290 [ 346.169928] ? putname+0xf7/0x130 [ 346.173399] ? do_syscall_64+0x9a/0x820 [ 346.177387] ? do_syscall_64+0x9a/0x820 [ 346.181379] ? lockdep_hardirqs_on+0x421/0x5c0 [ 346.186224] ? security_file_ioctl+0x94/0xc0 [ 346.190671] ksys_ioctl+0xa9/0xd0 [ 346.194153] __x64_sys_ioctl+0x73/0xb0 [ 346.198069] do_syscall_64+0x1b9/0x820 [ 346.202010] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 346.207404] ? syscall_return_slowpath+0x5e0/0x5e0 [ 346.212374] ? trace_hardirqs_off+0x310/0x310 [ 346.216913] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 346.221960] ? recalc_sigpending_tsk+0x180/0x180 [ 346.226747] ? kasan_check_write+0x14/0x20 [ 346.231021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.235898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.241101] RIP: 0033:0x4574e7 [ 346.244306] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.263227] RSP: 002b:00007f9a03e58a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.270957] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004574e7 18:41:12 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = dup2(0xffffffffffffffff, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 346.278225] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 346.285522] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 346.292815] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 346.300109] R13: 0000000000000000 R14: 00000000004c4a7f R15: 000000000000000a [ 346.316151] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.322913] bridge0: port 2(bridge_slave_1) entered forwarding state 18:41:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000080)=0x2) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x142, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x401, 0x210000) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x2b, 'memory'}, {0x2b, 'io'}]}, 0x12) [ 346.332594] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.339633] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.360486] hfsplus: creator requires a 4 character value [ 346.402499] hfsplus: unable to parse mount options [ 346.408301] device bridge0 entered promiscuous mode 18:41:12 executing program 4 (fault-call:2 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0xfffffffffffffd8f, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x2710}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 18:41:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(r1, &(0x7f0000000000), &(0x7f0000000080)=0x2) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x142, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x401, 0x210000) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x2b, 'memory'}, {0x2b, 'io'}]}, 0x12) 18:41:12 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r7}, 0x14) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r8 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 346.592572] FAULT_INJECTION: forcing a failure. [ 346.592572] name failslab, interval 1, probability 0, space 0, times 0 [ 346.604499] CPU: 0 PID: 14252 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 346.613055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.622460] Call Trace: [ 346.625080] dump_stack+0x1d3/0x2c4 [ 346.628728] ? dump_stack_print_info.cold.2+0x52/0x52 [ 346.633950] should_fail.cold.4+0xa/0x17 [ 346.638030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 346.643175] ? graph_lock+0x170/0x170 [ 346.647003] ? rcu_read_lock_sched_held+0x108/0x120 [ 346.652041] ? __update_load_avg_blocked_se+0x730/0x730 [ 346.657425] ? graph_lock+0x170/0x170 [ 346.661236] ? find_held_lock+0x36/0x1c0 [ 346.665320] ? graph_lock+0x170/0x170 [ 346.669140] ? find_held_lock+0x36/0x1c0 [ 346.673228] ? print_usage_bug+0xc0/0xc0 [ 346.677312] ? find_held_lock+0x36/0x1c0 [ 346.681401] __should_failslab+0x124/0x180 [ 346.685658] should_failslab+0x9/0x14 [ 346.689470] kmem_cache_alloc+0x47/0x730 [ 346.693544] ? plist_requeue+0x620/0x620 [ 346.697623] ? rcu_softirq_qs+0x20/0x20 [ 346.701624] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 346.707365] idr_get_free+0x725/0xea0 [ 346.711206] ? ida_pre_get+0x140/0x140 [ 346.715118] ? save_stack+0xa9/0xd0 [ 346.718763] ? save_stack+0x43/0xd0 [ 346.722400] ? kasan_kmalloc+0xc7/0xe0 [ 346.726309] ? kasan_slab_alloc+0x12/0x20 [ 346.730467] ? kmem_cache_alloc+0x12e/0x730 [ 346.734802] ? __kernfs_new_node+0x127/0x8d0 [ 346.739229] ? kernfs_new_node+0x95/0x120 [ 346.743405] ? internal_create_group+0x5fc/0xd80 [ 346.748207] ? sysfs_create_group+0x1f/0x30 [ 346.752563] ? lo_ioctl+0x1310/0x1d80 [ 346.756390] ? blkdev_ioctl+0x9ac/0x2010 [ 346.760467] ? block_ioctl+0xee/0x130 [ 346.764284] ? do_vfs_ioctl+0x1de/0x1720 [ 346.768354] ? ksys_ioctl+0xa9/0xd0 [ 346.771989] ? __x64_sys_ioctl+0x73/0xb0 [ 346.776065] ? do_syscall_64+0x1b9/0x820 [ 346.780142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.785551] idr_alloc_u32+0x201/0x3f0 [ 346.789480] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 346.794346] ? lock_acquire+0x1ed/0x520 [ 346.798345] ? __kernfs_new_node+0x14e/0x8d0 [ 346.802773] ? __lock_is_held+0xb5/0x140 [ 346.806867] idr_alloc_cyclic+0x166/0x350 [ 346.811034] ? idr_alloc+0x1b0/0x1b0 [ 346.814762] ? kasan_check_write+0x14/0x20 [ 346.819018] ? do_raw_spin_lock+0xc1/0x200 [ 346.823291] __kernfs_new_node+0x1ee/0x8d0 [ 346.827552] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 346.832337] ? _raw_spin_unlock_irq+0x60/0x80 [ 346.836853] ? __schedule+0x150c/0x1ed0 [ 346.840861] ? graph_lock+0x170/0x170 [ 346.844677] ? graph_lock+0x170/0x170 [ 346.848497] ? trace_hardirqs_on+0xbd/0x310 [ 346.852838] ? kasan_check_read+0x11/0x20 [ 346.857031] ? find_held_lock+0x36/0x1c0 [ 346.861123] kernfs_new_node+0x95/0x120 [ 346.865115] kernfs_create_dir_ns+0x4d/0x160 [ 346.869544] internal_create_group+0x5fc/0xd80 [ 346.874177] ? remove_files.isra.1+0x190/0x190 [ 346.878789] ? up_write+0x7b/0x220 [ 346.882363] ? down_write_nested+0x130/0x130 [ 346.886798] ? down_read+0x120/0x120 [ 346.890555] sysfs_create_group+0x1f/0x30 [ 346.894720] lo_ioctl+0x1310/0x1d80 [ 346.898373] ? lo_rw_aio_complete+0x470/0x470 [ 346.902890] blkdev_ioctl+0x9ac/0x2010 [ 346.906793] ? blkpg_ioctl+0xc10/0xc10 [ 346.910691] ? lock_downgrade+0x900/0x900 [ 346.914859] ? check_preemption_disabled+0x48/0x200 [ 346.919904] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 346.924854] ? kasan_check_read+0x11/0x20 [ 346.929016] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 346.934304] ? rcu_softirq_qs+0x20/0x20 [ 346.938309] ? __fget+0x4d1/0x740 [ 346.941788] ? ksys_dup3+0x680/0x680 [ 346.945521] ? kasan_check_write+0x14/0x20 [ 346.949780] block_ioctl+0xee/0x130 [ 346.953450] ? blkdev_fallocate+0x400/0x400 [ 346.957794] do_vfs_ioctl+0x1de/0x1720 [ 346.961696] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 346.967261] ? ioctl_preallocate+0x300/0x300 [ 346.971680] ? __fget_light+0x2e9/0x430 [ 346.975673] ? fget_raw+0x20/0x20 [ 346.979147] ? rcu_read_lock_sched_held+0x108/0x120 [ 346.984183] ? kmem_cache_free+0x24f/0x290 [ 346.988441] ? putname+0xf7/0x130 [ 346.991925] ? do_syscall_64+0x9a/0x820 [ 346.995914] ? do_syscall_64+0x9a/0x820 [ 346.999906] ? lockdep_hardirqs_on+0x421/0x5c0 [ 347.004517] ? security_file_ioctl+0x94/0xc0 [ 347.008973] ksys_ioctl+0xa9/0xd0 [ 347.012457] __x64_sys_ioctl+0x73/0xb0 [ 347.016378] do_syscall_64+0x1b9/0x820 [ 347.020288] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.025681] ? syscall_return_slowpath+0x5e0/0x5e0 [ 347.030631] ? trace_hardirqs_off+0x310/0x310 [ 347.035142] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 347.040182] ? recalc_sigpending_tsk+0x180/0x180 [ 347.044955] ? kasan_check_write+0x14/0x20 [ 347.049215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.054090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.059290] RIP: 0033:0x4574e7 [ 347.062495] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.081415] RSP: 002b:00007f9a03e79a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.089157] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004574e7 [ 347.096445] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 347.103721] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 347.111003] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 347.118292] R13: 0000000000000000 R14: 00000000004c4a7f R15: 000000000000000b [ 347.151327] hfsplus: creator requires a 4 character value [ 347.166583] hfsplus: unable to parse mount options 18:41:13 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:13 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000000080), 0xffffff17) [ 347.265498] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.272105] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f00000004c0)=""/195) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000100000000000000284de241000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x7f, 0x30, 0x7fff, 0x80000000}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000005c0)={r5, 0x4, 0x9, [0x7, 0x5, 0x3, 0xb0, 0x10, 0x0, 0x1f, 0x7, 0x57]}, 0x1a) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000140)=0x78) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x4) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:13 executing program 4 (fault-call:2 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 347.364264] device bridge0 left promiscuous mode [ 347.468436] FAULT_INJECTION: forcing a failure. [ 347.468436] name failslab, interval 1, probability 0, space 0, times 0 [ 347.479782] CPU: 1 PID: 14285 Comm: syz-executor4 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 347.488301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.497680] Call Trace: [ 347.500303] dump_stack+0x1d3/0x2c4 [ 347.503961] ? dump_stack_print_info.cold.2+0x52/0x52 [ 347.509188] should_fail.cold.4+0xa/0x17 [ 347.513277] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 347.518400] ? lock_release+0x970/0x970 [ 347.522421] ? ttwu_stat+0x5c0/0x5c0 [ 347.526164] ? graph_lock+0x170/0x170 [ 347.529988] ? graph_lock+0x170/0x170 [ 347.533827] ? find_held_lock+0x36/0x1c0 [ 347.537921] ? __lock_is_held+0xb5/0x140 [ 347.542023] ? ttwu_stat+0x5c0/0x5c0 [ 347.545759] ? kernfs_activate+0x21a/0x2c0 [ 347.550040] __should_failslab+0x124/0x180 [ 347.554314] should_failslab+0x9/0x14 [ 347.558147] kmem_cache_alloc+0x2be/0x730 [ 347.562315] ? lock_downgrade+0x900/0x900 [ 347.566483] ? do_raw_spin_lock+0xc1/0x200 [ 347.570742] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 347.575783] __kernfs_new_node+0x127/0x8d0 [ 347.580038] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 347.584816] ? graph_lock+0x170/0x170 [ 347.588657] ? __lock_is_held+0xb5/0x140 [ 347.592744] ? wait_for_completion+0x8a0/0x8a0 [ 347.597360] ? mutex_unlock+0xd/0x10 [ 347.601094] ? kernfs_activate+0x21a/0x2c0 [ 347.605350] ? kernfs_walk_and_get_ns+0x340/0x340 [ 347.610219] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 347.615772] ? kernfs_link_sibling+0x1d2/0x3b0 [ 347.620384] kernfs_new_node+0x95/0x120 [ 347.624388] __kernfs_create_file+0x5a/0x340 [ 347.628824] sysfs_add_file_mode_ns+0x222/0x530 [ 347.633532] internal_create_group+0x3df/0xd80 [ 347.638141] ? remove_files.isra.1+0x190/0x190 [ 347.642739] ? up_write+0x7b/0x220 [ 347.646298] ? down_write_nested+0x130/0x130 [ 347.650729] ? down_read+0x120/0x120 [ 347.654478] sysfs_create_group+0x1f/0x30 [ 347.658650] lo_ioctl+0x1310/0x1d80 [ 347.662318] ? lo_rw_aio_complete+0x470/0x470 [ 347.666834] blkdev_ioctl+0x9ac/0x2010 [ 347.670759] ? blkpg_ioctl+0xc10/0xc10 [ 347.674677] ? lock_downgrade+0x900/0x900 [ 347.678855] ? check_preemption_disabled+0x48/0x200 [ 347.683918] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 347.688894] ? kasan_check_read+0x11/0x20 [ 347.693072] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 347.698371] ? rcu_softirq_qs+0x20/0x20 [ 347.702381] ? __fget+0x4d1/0x740 [ 347.705866] ? ksys_dup3+0x680/0x680 [ 347.709607] ? kasan_check_write+0x14/0x20 [ 347.713877] block_ioctl+0xee/0x130 [ 347.717536] ? blkdev_fallocate+0x400/0x400 [ 347.721892] do_vfs_ioctl+0x1de/0x1720 [ 347.725805] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 347.731366] ? ioctl_preallocate+0x300/0x300 [ 347.735792] ? __fget_light+0x2e9/0x430 [ 347.739788] ? fget_raw+0x20/0x20 [ 347.743265] ? rcu_read_lock_sched_held+0x108/0x120 [ 347.748300] ? kmem_cache_free+0x24f/0x290 [ 347.752557] ? putname+0xf7/0x130 [ 347.756041] ? do_syscall_64+0x9a/0x820 [ 347.760038] ? do_syscall_64+0x9a/0x820 [ 347.764032] ? lockdep_hardirqs_on+0x421/0x5c0 [ 347.768636] ? security_file_ioctl+0x94/0xc0 [ 347.773080] ksys_ioctl+0xa9/0xd0 [ 347.776554] __x64_sys_ioctl+0x73/0xb0 [ 347.780462] do_syscall_64+0x1b9/0x820 [ 347.784368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.789759] ? syscall_return_slowpath+0x5e0/0x5e0 [ 347.794722] ? trace_hardirqs_off+0x310/0x310 [ 347.799246] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 347.804285] ? recalc_sigpending_tsk+0x180/0x180 [ 347.809066] ? kasan_check_write+0x14/0x20 [ 347.813337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.818228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.823447] RIP: 0033:0x4574e7 [ 347.826659] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.845615] RSP: 002b:00007f9a03e58a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.853354] RAX: ffffffffffffffda RBX: 0000000020000790 RCX: 00000000004574e7 [ 347.860637] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 347.867934] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 347.875215] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 347.882497] R13: 0000000000000000 R14: 00000000004c4a7f R15: 000000000000000c [ 347.957630] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.964247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.971054] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.977475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.985035] device bridge0 entered promiscuous mode [ 347.994883] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.001416] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:14 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 348.020767] device bridge0 left promiscuous mode 18:41:14 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:14 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:14 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 348.425538] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.432580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.441697] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.448587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.461304] device bridge0 entered promiscuous mode 18:41:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 348.499576] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.506158] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.529798] device bridge0 left promiscuous mode 18:41:14 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 348.682105] hfsplus: creator requires a 4 character value [ 348.704533] hfsplus: unable to parse mount options 18:41:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000140)={0x1, r1}) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_read_part_table(0x6, 0x5, &(0x7f0000001840)=[{&(0x7f0000000580)="1611269523c775052f1b74cd99585ba4122bdbc1036fd3e566c98d59c50b05e09e0ef77b3cf83f857535ed0f584c387e348688b22d4c71a3c6179b6b81a4b5544b45ad8cc76c0cc5bd9ad79106f09cef98eac5cac065e46758", 0x59, 0x1ff}, {&(0x7f0000000600)="af8ea3041a47fbe82ddf1385d3f5a02740d01a76ee633ecea674796a416f22b36d78080a834c8ef590588391f78787da1ba34e11d717b1240fe1059b12e21efaecef3d3530c202ccf312a7061624c59e9fbb100706be2a715adb2e594d638e9892bea387d3c31d8c972e03116866eaab8e6469117fbc1a50655f99867e2e0ed302941a858c850c8cb2fd460713a3df43ece4a3b9b7ed45f4933f4aba1809c883a9815c2e2267f246b715529129d3fa9d71c3471eda0fc056067d2ba664e841bedd398e5ceddf72086ab8031f61c5a4ca24a81c0cd676dcb6a2055d7ab3f2e8606dc38d603641e59edb5ba3da5686aed547e742245632151712973500e5da4010ff166b06ebb8c03b4f370b4b4b43dc31c740d73a783912db815269c5b09781cd9952ac53e2656284824a2c67887ec6ddecb06d994de955a893941ce2553c8f775423d1418b0c6327ffd73d29f39c2a55f38b80a7589b9ab48a7412c96fdce673edffdfdeace73e4a49ad5f45f1fa4c5d4fcc28979a3852fb65a7df0f50fe8ac163d08d2175f2dba57acb6f6e50afed86438c6bb0016997b52d8c8e686d7be4a808533e95a3d1794bb674a8c9dbaba837a8db69290c6dbed26175f231ed882c47dcdd1834be5c1c46d743314b09743c8dbcc628a6d981f63e4a616e67ff320a8301c5a7dcbde689bfeb76d4e562f3be8885c023004cd31fc35beb16b6336c98d46b6aafb82a854d8ae5acf091a5f7051bd203863eeb52824e941443102be952d3ad043817c0ed6f00ebda9ea144e51d0a80c79e1ef6a97dfef003efe2bcd3c4746ab31c795f0a842d3a9a85b9d2ed2654411589b6a8e4b1629dca4dc0944b58dae3968f9bef5483c8949dfae6bf0f0426440876cd42eab5e5bfc318a0b413aeb9d658d7abe4292ee254e938d796d8d8a665b1e165382717ea877f6682506faad97581c19b7204368bc7d593a58c321a8464195a4453ce42d326e4cef52d6a443af54c633dec2af9560065875b98d833bbac45ee98f0d9ac82a570caaf7917473e22d64cb42be50da93b9169820ade75f668a47f5fca02da1cff3631edee2a76680ae2ee46673e1ad6d9ae7c40892e0a0998b38989c7ebdb54081052547ae6b5e255605f731e5d5aec069833a5d6cfb3767bc9110f8d9da41106485551942d468bce0d27d55fdc47585993dd45696aa90b5cacd872ac742297c46f9b6a9312fe256bad1b756e691f0199a8159803707c1f1abbd108d50230051afe63ab7d40dd9d79f15b5833a46e372feb2ba01f7af19b6944f2249439d1c17770cb8d13254f2dc937f36d729b4e16c2c4a95a1e7bc59d64f62919370db9c0ffda9e038172a6078443f7062c92198c818529bff079c793071de3fe753f255ffddf74d859229a968b3966648acb7f274d15df1b5f669e8bca8d874d1ec39a3b35caf9d6feef877e4aa63a2330434d9091a7ff0c9897621e44730bfab425117b4ccbdf6ac8b675e6e6b0e748e6e331b397395b5bc9b67472a97e0739f5149ba54e750033d7e153b53c23a5cef5165c9088da2db74452b6cb4bf10d73a97fa0a244704911b2013f14750b6402f8fafe0743b5014062982dd129f1ec07c7f0b7b415ddb940825544292453d292f544021be0b8a0a8919b4b5d64180f5201b0a25e3b1fcee774e3ef5b4e86be522f19670b5cfc299e7b397a914353ed9c5124fdebe00f843da57655a834f391196ebbd54d5efac05d128699ea0ffa1139f1e277d9509a26ded39f339eecdec9c827a321794835b70bb032c8ff486d9f9e8ba1b606a7b4972f8a0940140d8c29fa51544e6210c96f85091873ec97a5eb8df273177475609c2c77dcd1586ba7b0f824ae7c12e1d4267842fb72222cd448d8219365d72462e8d57310f49749f532321e02bdd736b8f70a124dd8bc5abb826fd0d0335cc6bac81ce2bbbbc0ad393874b2c3567950c1b0d33fbd0ad7c7fe952ceed44e0617950a7b27187b833188650a6421ddbe4c49828f1036ccc0f335625f2f9a550963350a34d5d726196a8bed6f2f4909fcf2186437521def4b0827f96ac651b02b7bf767bcb0795fe53f5fc85c0571259794f5a888ae2296706406fc661b9ec1f04cc1a53d9ef02313db6b5244de601aa7c57b3b4659c53a9de2df035e02f96598ea14c3ca30006092363bda113adab878cb500eb6ab50a7a40a36a660070a144e3caeccf1f8af20f72f8fac17200c0099fa9f208da63e70d8764ea625374a0d79f255ac809bdc92fd5b9238d3a4a0bab2ec037d483c119cbf24d14250f5b93ef3a22f8ff6f99acc226394dfb3b31e60c403c6c760b344d9ff34b934ed9ac43fa244302c7889b5a4f088af477b0f1f87e64073f1d3319c8b240138c15a1f00c62c334c7d5a7164eb08e4980358758c2bdee491ed4f878ca3720b77ff96efcfec4e6d3b2a1738913265576d2af265c558f3e17c38c955de4b88d72b668f4dbd253b754d362bddf34cbbc43699f1aa1eb9a1a8ec6a36d8e94e882ceabe54f581be55c69362af2a48208923a03132776904c19514b23e03ab92a3e524d72c3537c69888508eb42d00f9dc989c4f141cdd587348fc0cdf77929930f240c89df997e55034217df32cd9dd5db73f17cdc958c455aea9605db363dcda6bfb30c4755ba76266843308517c25a94c4dcb94a5441b4fbd11b5980f6d8664c74e21d126cb93d624a0f23e3d859d45a7e4b1599b16d720776ba96e74fbd7d0c5d088680f75f6ac49294864e32633d419346be05dddd8fde42b578fa8492145c46708d428a8e8f198acadcf0a424c51ac43ecb25a45483d0f1d0e69d54269fa64ed9918c6b4cc7089ebf75fe2d0617d113c36cab12a7b7284f7dd4762a9b43ff12796c88c00271dd7b321400eff02b8141a5aed9eff7eb06e2bcab4cc199429b01d0bf884279480b8fcd162b86391d102ae80dd9d5acf5a8e30d83dd6c4715de294026bb2ddcda534ee3aabcf9ba5759c4585a7fd143faacb6f67d7b86676bf3dbb9d19c72ef1af697273915d13f61315450c6b9f2dd472b2753ade58f92130dff2aed39fba9258fe8903ae472f65b5f3746641dd26658d75442d987dae5d13934d0ae8a4a88fc97524ec444b06f93362fea42c09c928e3afc771847680e557a55c8461999bd17a2c74215129746b84daa31abcf3896debb75f0c6114e442810ae131867699e88d6d3b96971f7933f1a9ab68a9374e9b0ce37bbe28fb6df462b6d29656cb7857aebe01524fac4db298d8f57f0c55b7df0baec402a8ccb2720d3014b049bd8a4debec98430246fe7eeb96db0f70bedc1b75fcf1c6264003eb68fd683ecd9ac29644a8c55bb631227f35947b86ad896c7f76919f2513941e24d25f5a9a7a28bc69063d2e1e911fd9ef9a5f6fed1482cbef86c31cb0773cf0b7dc37ed7242a365c65cc3412967df51d5b9cc2f06cab1f82dda550a687a40e16057f6bc1160d9c37699aff33859725a0b1553ab1bd34168fe3e73d6819fa828e1642e93c21988b02b8f67e3cfc3019c2931a571f02aa5b5ea8e8be20d30beb0d833d3fb754087865f928caa9d4ae6b229e965bc3acc9d4dba5ff916aa0b93f749f8c23113771e2efae4352bdfa24e2e420e9621b3f333a3753cda1691fb98cd9376ffe0caa8b53ea977b75c940ceb19041f511dc60b8e05c85d09fa021845b0f8e2d82ff3d6258a4ca461f450a8f6a280fca43433eff815341a3c860dbd5fe561715c2a4412aeb089562ab2df341397d738ecba48387aa66dd73208e3ebabb402a0b76a67723c164ba882947e68dacdc1b98ab7ca0f9d72c0548c9b7f002c50afb84ecf9ab9a87f9d62c98fb53816e656fc9c7b630f74196d420816caf1c0e81948d0f1c4e201321768b0e767dfb39e3bf6aa3afe62465c23de04a2c128bc22cc0924534590e4380ee8178e9054602465cca7393d5367ec14d5d6b9431af844c5bd3670a4de752c173083e55bf6118d2aacf6675e1d414611aaaba7b056223485e86a1b834c8f051da2b0fb67ba6f04526d1a1a9dbd31222960d7c4bda8f12d9a0f0082a33ca577933699a092219178a1a28e41d82b24c09730201f1c4b16eb0436cf3a8afe684fc4f31c8fd5b90b117d3966dc3799ca8dbc371a2c5babe685a5074c9d0305c3c892596f750b2aea2aa0997bc7db254e578c489949babf6cc635bf22c88564d233b7691ae851b022ac864333d47d232527f62f01eea34a563ab8b65736f68bcbdd1fab7127a8eacaaf8379b8be0546adf1b8db84615ea4cf6a7a73e41c7da1c70db8e6202e09a07a92db99382b1ef688121263f38009d036c07b5c88b9991716de85c4c80f13b575045a19685144e547746b8a060585031ef3f15840b980e6cd6dd6798d7b6ab1f24c662b595b4528027a93a884bd2c266b483725698f5b244490b5b60b740fa45a1a1600cb3a4f418a5fd68c4c43ab2618db7164d4a1b9f7591fa5cd5bffc26b7a58fa9b58822ebea1dd8b9e09ad8a6e879f887d1a3084ecd773057493ae3946c5eaa4f62512a8920b8b259b53718e50dae30d79c96e9d01b09bfcee3ce9f2b161ecc3d9f355b77d7a064df3f027a6b195841de36e78e72cd4ae7d20e1e122b6e12d73a470a06f713238b452b45512539fcd503be41f30425df9993b7003c939729123042aaf2b1a14886145829f2e36f1294a2a68d2e4c6752674dcf3a9b820b78dbd18d8ebc80d3084218eda9300d49e8f4d2b0a2c3446185fdc1c716ee538a15ae99c933f1bc743f14cda1b4ea327d3be558b7e9fec2a611062ab3715128c4ad014df5fa7e2c21159668b6f4e8f07e920d74c716f18c46ea18f5a72a83abdb3438868cc33bffb3e6bc951740c55e5a0004065b6dbcfbdc3be7f3c9a7168fa72d90da297b7eeb50f01d4dc3851572a735ff9a479c84f4d099ec1bf3be69320c97c859bbaa19ac2c247cb1c0d5935089d652393147e5320cd3ffa6a83c6e0b1c313be84bfa511b1ba90e6984d3c8c093c8735bf4174a53239c49124c7bf7ffc7e3f67cb02c0457f9aea4133852ac23500a85146ccb014fd4dcbf27b2dd35051e2786d7efee6f60aee6c5576cb96f30f5a6f43144fce7794eb502f92b5837ecb84210805ea1072e137d13a617dd013b5a21bcdceb810e0e3d4fbd76d0925ef1eb9af578db69d95753c7373562b41e6494cc62d9c98f8bef9a0971d2e9a8303050b43393f9eb5556039d92c9560f7ab59b0a49cc9214c1a8d6914e457ccdfbd4831072b9ac0fc04d137576704f9c697d342a9ff7731f2dc3246c4b7df5147f6b2458a5fc5dfc90adaade02b0e02e70cacfc3be15a3d7499f3e16714271cd0c5af6097017b16423cf5fd59dd04170d3468514b90d9b44492e925bf047a46878351f4e17e5ad2ea07b0be5f5fe596551059e08bb8303aa0c1f61b96d87d1d77dc2322c382459b842e8e049bbfe2a2d485e5d5ff5bdbf6e612cab96b8c3757ed4dd53cce14b4b4be40a9cda0a3e3e8c7d71d98d45cec251a52cfdbd10caa6447098546c620f87de42bf56c36415a0c375be14704dac0609b640b9bb15067ffe4619dd609df05886106ef7dc225f8c29b57a294586f436bd2fc6dbf15f59d04452f4cb39a4130083d145d7eb6ef00a6700691068692aa39ad2665e19a029e190c52e2a457885e1e14b4ee8cac50272ee04fdfd21cd7d034f88e787c3c3b9db63da4bfef84a3ad8dfc70d75fabb8893372b565b0a1fcb757e6ffffb37d9578768007a6415fed2791a3f9a1ebf99c3dcb9eb1f7b1ed86f7232237114f7f1e9bcb2a75dad6662673", 0x1000, 0x5}, {&(0x7f0000001600)="e6d7527f7a89465796c3efa4fbcdff0542a8838648f894841b800898cc5b9f03da73e4f78a5c728d55285af1796e5ec46aa367c4555c009f5fad6a9aecb91d0491d5267c092e980ceda891e278c15eb26e2d5d883d59b482d9a756a55277f1271bfdf2f3bc0c191e2ed400f5f240ac54db7b4066dbc39c5e5953deb4343efa76736d17fad2688168f940e921e9595623f825958ec0415e144847cf2263d955f02ee0ff559fa9d1f42157dd0d5585a9dbebaa32", 0xb3, 0x3ff}, {&(0x7f00000016c0)="c751a8d29b94619654648c4dc5f9a889d9eb44028568f1bae76ddb3bbdb45bb737561a828f3e0d544a5040d61f1a6ed53f66a3d8ed85c250f78111b365c02dfde5f17a8e2182d8d67215b7c063e86bc844eb520ed0b69c02", 0x58, 0x6}, {&(0x7f0000001740)="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", 0xff, 0x1}]) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000004c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x6}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000003c0)={r5, 0x9}, 0x8) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000300)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r6, r4}}, 0x18) [ 349.012556] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.018989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.025867] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.032357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.051603] device bridge0 entered promiscuous mode 18:41:15 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 349.060607] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.067096] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='\nfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:15 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000), 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 349.103763] device bridge0 left promiscuous mode [ 349.211105] Dev loop5: unable to read RDB block 8 [ 349.217152] loop5: unable to read partition table [ 349.223273] loop5: partition table beyond EOD, truncated [ 349.235122] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 349.446882] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.453978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.463191] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.470258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.489967] device bridge0 entered promiscuous mode 18:41:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5f, 0x8800) ioctl$sock_bt(r1, 0x8907, &(0x7f0000000dc0)="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") write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000200)={{0x0, 0x1001, 0xf, 0x9, 0x80, 0x8, 0x7fffffff, 0x3, 0xc9, 0x956, 0x3f, 0x6}, {0x5e18d43f7959238, 0x0, 0xf, 0x7f, 0x1, 0x3, 0xf2, 0x3ff, 0x1, 0x1, 0xfff, 0x1ff}, {0x101000, 0x2, 0xf, 0x0, 0x7, 0xfffffffffffffc01, 0x101, 0x400, 0x4, 0x0, 0xfd, 0x5}, {0x2, 0x106004, 0x1f, 0x0, 0x6, 0x0, 0x6, 0xe4, 0x61, 0x21e, 0x4}, {0x4, 0xf004, 0x0, 0x7, 0x9, 0x9, 0x8, 0x0, 0x1, 0x8, 0x200, 0x6}, {0x117006, 0xd002, 0x10, 0x2, 0x250, 0x3ff, 0x20e0, 0x8, 0xfffffffffffff01e, 0x8, 0x3, 0xff}, {0x5000, 0x5000, 0x0, 0xfffffffffffffffa, 0xf20, 0x59f8, 0x12, 0x9, 0x2, 0x3, 0x1ff, 0x80000001}, {0x3002, 0x5000, 0x1e, 0x3, 0x3, 0x7ff, 0x3ff, 0x8, 0x5, 0x8001, 0x5, 0x2}, {0x10000, 0xf002}, {0x2000000000006000, 0x5000}, 0x0, 0x0, 0x4, 0x80, 0xb, 0x0, 0x10000, [0x9, 0xfffffffffffffffd, 0x8, 0x80000001]}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) inotify_init1(0x80000) [ 349.530775] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.538679] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.570390] device bridge0 left promiscuous mode 18:41:15 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 349.590762] Dev loop5: unable to read RDB block 8 [ 349.597668] loop5: unable to read partition table [ 349.624769] loop5: partition table beyond EOD, truncated 18:41:15 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 349.647057] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 18:41:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000004c0)=""/255, &(0x7f0000000140)=0xff) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 350.183148] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.189790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.196533] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.202986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.209897] device bridge0 entered promiscuous mode 18:41:16 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:16 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r6 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r7}, 0x14) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r8 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='%fsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 350.232967] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.239583] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.253735] device bridge0 left promiscuous mode 18:41:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000200)={r2, 0x9, &(0x7f0000000080)=[0x0, 0x3, 0x100000000, 0x0, 0x3ff, 0x6, 0x3, 0x7, 0x2], &(0x7f00000000c0)=[0x0, 0x9, 0x82], 0x1, 0x2, 0x80, &(0x7f0000000100)=[0x6, 0xff], &(0x7f0000000140)=[0x2, 0x0, 0x4, 0x2, 0x510e, 0xffffffff, 0x7]}) [ 350.723035] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.729634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.736520] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.743003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.749913] device bridge0 entered promiscuous mode [ 350.758772] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.765474] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:16 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:16 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) [ 350.780071] device bridge0 left promiscuous mode [ 351.165394] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.171833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.178497] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.185007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.192551] device bridge0 entered promiscuous mode 18:41:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x10}, {r0, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) write$P9_RVERSION(r3, &(0x7f0000000140)={0x13, 0x65, 0xffff, 0x81, 0x6, '9P2000'}, 0x13) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 351.211083] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.217753] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:17 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 351.256571] device bridge0 left promiscuous mode 18:41:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) [ 351.579885] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.586901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.595972] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.602993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.612384] device bridge0 entered promiscuous mode 18:41:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='h%splus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:17 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}], 0x1, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:17 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) [ 351.650840] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.657504] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.684312] device bridge0 left promiscuous mode [ 352.054363] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.062013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.071368] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.078473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.087835] device bridge0 entered promiscuous mode 18:41:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x2) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 352.130322] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.136907] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:18 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}], 0x1, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) socket$inet6(0xa, 0x1, 0x10001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 352.176969] device bridge0 left promiscuous mode 18:41:18 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 352.528605] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.535236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.542087] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.548468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.555377] device bridge0 entered promiscuous mode 18:41:18 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:18 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 352.576817] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.583922] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='h\nsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 352.641268] device bridge0 left promiscuous mode 18:41:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x240040, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x2, 0x81, 0x0, 0x7, 0x0, 0x7ff, 0x12c0, 0x0, 0x4, 0x10000, 0x4, 0x17609b2d, 0x752b, 0x7f, 0x7, 0x37a7b070, 0x40, 0x7, 0x100000000, 0x0, 0x6, 0x8, 0x90b, 0x81, 0x0, 0xffffffffffffffe0, 0x3, 0x3f, 0x5, 0x40008, 0x1ff, 0x8, 0x4, 0x9, 0x4, 0x8000, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x102a, 0x401, 0xf0, 0x5, 0x0, 0x7, 0xa0000000000}, r3, 0x0, r2, 0x2) [ 353.283934] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.290404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.297152] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.303621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.310739] device bridge0 entered promiscuous mode 18:41:19 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:19 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890e, &(0x7f0000000740)="153f6234488dd25d766070d36a3e832fc4208248cd448e3e9aefc1879a9cf02f99ca96faf6d34224e20bc7a17539b42fc52f6fce68720300000000000000f57cfc52447f5ef6e9322f6cf1294433fd536e8ebdccf7740b0f56b3a2786188f2a1d36e0da0ca6db1991a7f8f1523a8390a6ff88c57931d7f5d0000be19ece75ca8a34ecb6a706e75a6bfb480ede9bc57ddf1ac072e0e77683e5fa79220a07cb92699eb3614c6c4a18ec460fa302472152738660c89cf2f287fa54ec516f9482ce62c4cd64f000000000000") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) write$UHID_CREATE(r3, &(0x7f0000000600)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000580)=""/120, 0x78, 0x1, 0x101, 0x8, 0x1f, 0x7e1}, 0x120) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x5, 0xd2, 0x4, 0x2, 0x9, 0x3f, 0x401, 0x0, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e24, 0x80000000, @empty, 0x2}}}, &(0x7f0000000200)=0x84) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:19 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='pagemap\x00', 0xfffffffffffffffb) keyctl$revoke(0x3, r0) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6749, 0x20000) ioctl$RTC_VL_CLR(r1, 0x7014) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 353.329912] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.336426] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.357601] device bridge0 left promiscuous mode 18:41:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) connect$pptp(r1, &(0x7f0000000300)={0x18, 0x2, {0x0, @remote}}, 0x1e) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000240)=r5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000140), &(0x7f00000001c0)=0xb) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0xfffffffffffffffe, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:19 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0xb9, 0x8, 0x2}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 353.832110] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.838568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.845316] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.851734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.858446] device bridge0 entered promiscuous mode [ 353.870884] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:19 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf+plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:19 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 353.877362] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.895178] device bridge0 left promiscuous mode [ 354.337879] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.344450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.351249] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.357621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.364465] device bridge0 entered promiscuous mode 18:41:20 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:20 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 354.383041] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.389614] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.426458] device bridge0 left promiscuous mode 18:41:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40040, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf0plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:20 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 354.876824] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.883457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.890283] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.896698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.904247] device bridge0 entered promiscuous mode 18:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000001c0)=@ethtool_rx_ntuple={0x35, {0x4, @tcp_ip4_spec={@multicast1, @local, 0x4e24, 0x4e24, 0x43d}, @usr_ip4_spec={@multicast1, @rand_addr=0x5, 0x9, 0x101, 0x1, 0x2}, 0x81, 0x5, 0x3f, 0x6b1, 0xffffffffffffffff}}}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:21 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:21 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xcbc, 0x102) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040)=0x6, 0x4) 18:41:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfXplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:21 executing program 5: r0 = socket$inet6(0xa, 0x3ffffffffffff, 0xfffffffffffffffe) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000140), 0x0) [ 355.099290] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.105898] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.171030] device bridge0 left promiscuous mode 18:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="000000eeffffffffffffff0000000000000000001600000000000000000000000000000000000000000000000000000009bd572c400c066ae77e35741f4edbced7a3420bc7834f3f5c3a41fc4e9119f7ebdd38d6826eddbb3ac7603030abad57f6d51569b63f4dbe9fe802ec71bba986e43ad406c4b67872fc91096692a0dce361a0d84e90f5a5af04a914cb"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:21 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 355.557998] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.564639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.573506] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.580179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.614247] device bridge0 entered promiscuous mode 18:41:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x400, 0x10000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:21 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hflplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:21 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r0, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e61740000000000000000000000000000010000dbf0e498f3046c0f83000000000000000000000000000000000000000000a603d517beac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000100000000000000000010000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000004c0)=""/248) 18:41:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fdatasync(r0) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000200)={'mangle\x00', 0x32, "aabc8b1879c990498644172d4ba5fa0d7a4e4d869018a81668c70c40842c96aadb79ee9bacdc6ae8b3de524f3031ce02ed74"}, &(0x7f0000000000)=0x56) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000080)=""/143) [ 355.888178] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.894846] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.960786] device bridge0 left promiscuous mode 18:41:22 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair(0x5, 0x6, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:22 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x2000}], 0x1, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:22 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:22 executing program 2: socketpair$unix(0x1, 0x20000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40001, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 356.411721] Unknown ioctl 21378 18:41:22 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:22 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfdplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 356.738563] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.745093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.751913] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.758326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.766607] device bridge0 entered promiscuous mode [ 356.775428] Unknown ioctl 21378 18:41:22 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x2000}], 0x1, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 356.791302] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.799812] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.811014] device bridge0 left promiscuous mode 18:41:22 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x8000, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6174000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f208f6c77c891feec60d00000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp6\x00') open(&(0x7f0000000000)='./file0\x00', 0x100, 0x31) [ 357.729634] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.736193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.743010] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.749436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.757985] device bridge0 entered promiscuous mode [ 357.771167] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:23 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x10}, {r0, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 357.777714] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.789878] device bridge0 left promiscuous mode 18:41:23 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x100000000000000, 0x6, 0x9, 0x400, 0x0, 0x1, 0x0, 0x2, 0x8e, 0x6, 0x8, 0xfffffffffffffffd, 0x40, 0x8, 0x2, 0x3ff, 0x7, 0xfffffffffffffffc, 0x7ff, 0x8, 0x40, 0x3, 0x4, 0xf6, 0x5, 0x80, 0x7, 0x6, 0x80000000, 0x2, 0x5, 0x3, 0x7fff, 0x1000, 0x4, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0xfff, 0x8b1, 0x7, 0x5, 0x6, 0xd6f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x87) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x42000, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) 18:41:24 executing program 2: socketpair$unix(0x1, 0x200006, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x1350c0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0xbe, 0x4) r3 = getpgrp(0xffffffffffffffff) ptrace$setregs(0xd, r3, 0x80000000, &(0x7f0000000240)="e66496d4753386e6166888ae8613f9526a8cd2af6474764bd7bb9f2d5294976257e23fc84c550452b23de351b65c5e6ee2b50f30ad4ea25c1c773b870b8d05ec881d608443e05304ba01c90d44fc010c94aa18341a70cb64a12ae2df80667f4dea0917848aa15644811fe42a5ea1dffc52e16e6234d4b0fd1a018f27fdbbfbb5ec28f8817da97636a8c74593dcfe80f876f2cf1f8fa64bf2520b463b84545ed4c7a388c3fb24251f7d647532e1bdc6e7e1c4d271e54f329e7ccf98782dbee80ef575083912f91ac50c7768099d732fa5b566df0a9116338023b756b30cda") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x2, &(0x7f0000000480)) futimesat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0x2710}}) getsockopt(r0, 0x10000, 0x200, &(0x7f0000000380)=""/38, &(0x7f00000003c0)=0x26) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) [ 358.146317] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.152817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.159480] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.165926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.172817] device bridge0 entered promiscuous mode 18:41:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf-plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:24 executing program 3: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x10}, {r0, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:24 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000300)="b2211947008b7508b93a1ccc461bf9320012b726c2ed50e3b49ea3c71b06b77bd133f3b582f4465d7c82fcd3ae22fd624fe845dfcc0e4e7d41d2a40dfffa8886b29f34cad54d576c3cd666ae753a7d0e") r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000380)={0x3, r4}) syncfs(r3) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000010000000000000000000000000000000000000000000000000000000000000000e2f862b8"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 358.192288] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.198968] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.219665] device bridge0 left promiscuous mode 18:41:24 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101400, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000780)={@mcast2, 0x0}, &(0x7f00000007c0)=0x14) connect(r0, &(0x7f0000000800)=@ll={0x11, 0x17, r1, 0x1, 0xde4d, 0x6, @dev={[], 0x21}}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x140) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x8, 0x3ff, 0x1, 0x0, 0x9, 0x5, 0x9, 0x6, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x971}, &(0x7f0000000100)=0x8) epoll_create1(0x80000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 358.625635] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.632156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.638964] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.645433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.652371] device bridge0 entered promiscuous mode [ 358.660014] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.666543] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:24 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000300)={r1, 0x0, 0x18a, 0x79892f80, 0xfffffffffffffffd}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="0000592c1d4cb612ffdd3498a6a0bf1e000000000000000000000000000000040000000000000000000000000057de3d7f00000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000600)={0x9, 0x108, 0xfa00, {r6, 0x86, "07afed", "6b6a97eaa534bb9d1266b151c86ce885da979ca8c319f33496f08d7aba53c53e463e740bfb5681f052ddb78e7600fdc69153e91ef6acfc9f3ad842c1e52324eddb98769203dee11b6426b48f2a45ca8e112801ed54c2fe81c88a3aff4f9da417289a94d1167737269659b2b6331f4ddc9913bf9640263d95b5b79d3e70950508fc2ed57856c4e30d64094cdc62652b3a948d1c87b300496da6480bae09f08002005df78cc3e2caa1d05677ebc096bb0d124beddc2685c6a518f69c9a0d21bcb8ffc2b7f9635749ca9dae15e1112d250099d40a0ff69ea6e672c0f7829b0ca57d19fc25e9a44f98f5ae8d830a01ac30a2c3d0f31732f1a1f65a146cbabe5e905a"}}, 0x110) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000002c0)={0x2c, @loopback, 0x4e23, 0x0, 'fo\x00', 0x19, 0x10000, 0x37}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:24 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 358.704578] device bridge0 left promiscuous mode 18:41:24 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 359.088877] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.095892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.105006] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.112166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.119144] device bridge0 entered promiscuous mode [ 359.130489] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:25 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfcplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 359.137092] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:25 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 359.171374] device bridge0 left promiscuous mode [ 359.547944] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.554435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.561230] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.567595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.574820] device bridge0 entered promiscuous mode 18:41:25 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x109) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x191100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400206) r1 = msgget$private(0x0, 0x2) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/112}, 0x78, 0x3, 0x2000) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000730000003281537adbacddd17245ba0f7096fa81ef1979a0ba00000000000000f99a066a9876880811efdafe88df126d8e846aa52c00fb30e5551b22d74939f7d32eb7db6576baf85886bb7341f96fa7e932e1cbac6f9831a498d96686a719dbb61e8a51fd5d4b012f43267f0e12ea574c61f94a03f1"], &(0x7f0000000140)=0x97) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x10cb, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x377) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 359.621356] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.627954] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:25 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 359.694465] device bridge0 left promiscuous mode 18:41:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfuplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 360.112901] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.119421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.126217] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.132659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.140356] device bridge0 entered promiscuous mode [ 360.152631] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.159304] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:26 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200), 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 360.184973] device bridge0 left promiscuous mode 18:41:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 360.544666] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.551273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.557993] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.564458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.582164] device bridge0 entered promiscuous mode 18:41:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) socket$pppoe(0x18, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000001000000000000000000000000000000008000b7"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) bind$vsock_dgram(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x7, 0x7, 0x7fd, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:26 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 360.626415] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.632988] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.654417] device bridge0 left promiscuous mode 18:41:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x0, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:27 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 361.177309] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.183775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.190546] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.196922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.203992] device bridge0 entered promiscuous mode 18:41:27 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r7}, 0x14) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r8 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf%plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 361.222659] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.229320] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.267582] device bridge0 left promiscuous mode 18:41:27 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400001, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="09000700ff07aa000c049c0100040000050001000200"], &(0x7f0000000100)=0x16) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x801, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000040)={0x0, 0x6}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000001c0)) ioctl(r0, 0x8912, &(0x7f0000000280)="1e02dc33103b098d766bce") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x11a2) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c803, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000079cb3d435d7f4e35000000000000000000000000000000000000000000000000000000000000000000a500000000000000000400000000000000b26700000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x4000000000000000, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea1650800000000000000de2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) personality(0x510000f) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 361.703929] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.710417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.717157] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.723624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.730694] device bridge0 entered promiscuous mode [ 361.741964] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:27 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c9") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 361.749777] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:27 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 361.792360] device bridge0 left promiscuous mode [ 362.279124] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.285705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.292848] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.299249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.306438] device bridge0 entered promiscuous mode 18:41:28 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:28 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf*plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 362.324643] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.333090] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.383771] device bridge0 left promiscuous mode [ 362.820533] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.827142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.833971] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.840409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.847204] device bridge0 entered promiscuous mode [ 362.862223] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000080)='wlan1\x00', 0x5) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0xf, 0x4) r2 = perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x40}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x100000001, 0x3ff, 0xfff}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_int(r1, 0x0, 0x37, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x200, 0x0) [ 362.868812] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = dup2(r1, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000008000000000000000000000000000000000000dd605d"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:28 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:28 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 362.912286] device bridge0 left promiscuous mode [ 363.423997] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.430509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.437264] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.443743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.450634] device bridge0 entered promiscuous mode 18:41:29 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:29 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000), 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 363.471877] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.479630] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.526290] device bridge0 left promiscuous mode 18:41:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000008c0)='/dev/snd/seq\x00', 0x0, 0x1017ff) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000900)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000010000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000027321a25684d7a7d0000fb1fedb58b5cfd083cbcb1800a4f667ad688d4a4ffffffffffffc006f1e2354b9bc206b2ead0d15e1f5f63815c98b0c0cd2f295bbd49979744b02f", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000300)={r4, 0x2}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$TCSBRK(r1, 0x5409, 0x37) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f00000004c0)={"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"}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000003c0)) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000001c0)={r5, 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 364.062210] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.068786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.075602] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.082078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.089421] device bridge0 entered promiscuous mode 18:41:30 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfiplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:30 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 364.115156] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.122586] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.138013] device bridge0 left promiscuous mode [ 364.640913] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.647460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.654233] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.660683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.667455] device bridge0 entered promiscuous mode [ 364.677756] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:30 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r6 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r7}, 0x14) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r8 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r8, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 364.685043] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.721765] device bridge0 left promiscuous mode 18:41:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x2, 0x8000) 18:41:31 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 365.160171] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.166637] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.173414] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.179847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.189898] device bridge0 entered promiscuous mode 18:41:31 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfpplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x204000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0x7fff, 0xb0b, &(0x7f0000000040)="3a69212ce8c7c7ed2521c44dcc4eadf04a54f686074e42", &(0x7f0000000080)="ce9318726f6ea21821e9c2e849dacaba2f75d7a585dd472c34e271b401d2160883ce7a0f12849b6ea2b73ee7584b9665d446dbabe219c6c5d419bdff593ab0f4d4e37c7eb3ed7e7c181673d12fcd33911591b995b9f7a4f3874b46ab5296e2df78ae44d108c3d60cc9fe19d102f644c5eedc12bd3586258f66a14c2013c2362e195acb367db18ca332e53616c2f7ab097c194d9b0f71161cd00afdb37986922f9ab3126f46", 0x17, 0xa5}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000200)=0x8001) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 365.220807] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.227331] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.271150] device bridge0 left promiscuous mode [ 365.684585] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.691149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.697842] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.704281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.711111] device bridge0 entered promiscuous mode [ 365.720822] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.727374] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:31 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:31 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 365.746423] device bridge0 left promiscuous mode 18:41:32 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x200) mq_timedreceive(r0, &(0x7f00000001c0)=""/58, 0x3a, 0x1000, &(0x7f0000000200)={0x0, 0x1c9c380}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000580)="34488d668f2e7e54ba291e0432ae700000") getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000300)=0x40) r2 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x800000002) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000080)) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000000000000000000000000000000000d50000000000000000000000000000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 366.075417] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.082256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.091548] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.098008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.105173] device bridge0 entered promiscuous mode 18:41:32 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0xc0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000200)={0x8, 0x0, 0x9, 0x9, '\x00', 0x1828}) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x420004, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xc7f1, 0x4) flock(r0, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf\nplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 366.142808] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.150715] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.164481] device bridge0 left promiscuous mode 18:41:32 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 366.817675] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.824323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.831122] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.837523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.844348] device bridge0 entered promiscuous mode [ 366.854952] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.861467] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:32 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000001c0)=0x20800801d) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 366.880134] device bridge0 left promiscuous mode 18:41:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getegid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:33 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(0xffffffffffffffff, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 367.190186] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.196602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.203376] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.209795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.221446] device bridge0 entered promiscuous mode 18:41:33 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 367.251669] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.258158] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf#plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 367.298078] device bridge0 left promiscuous mode [ 367.684294] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.690929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.699395] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.706270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.715479] device bridge0 entered promiscuous mode [ 367.741316] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.747859] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.755136] device bridge0 left promiscuous mode 18:41:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8914, &(0x7f00000004c0)="15576af0ad8dd25d766070a66bcbb4c128649eb7ccb542b7c4df6618904bac44508cbd4e4e188d940f5cf8fc216e8db9b06bfaaf49da2cc6ebe6ab21432fda60519301000000000000004d54c8e03aab462868efed1be1b907f243d03fb8df52cc1fae89b40048cb17001b74a39fa6846fada7506ad5d94f8e5ddfc1c6f03834ca08714ee43057e10f360877d7829fc70359589d5d0672373555ca232aa7f42e300cc69b71a3328e42c96838a340ad1a742334212b452ea094bc432c0e3fec7eab2d71443c6bdeddd6235a907729e282d232066c0cb3d44c9e2de7bc9e19b74265d3b7723fe9d11910e038d62aa82ed878fb90c2622b") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x2, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:33 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:33 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(0xffffffffffffffff, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 368.133002] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.139971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.148746] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.155255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.162399] device bridge0 entered promiscuous mode 18:41:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hf.plus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f0000000000)="516f154c116736390c95c85e963eb647f3c05563368b6294bc03ed86baea70502df7f23793d14e8a5bdc056de56272fd0aae1ad8a33061fd8e3f1c2288fa24dc38617feef53a32a2bd8f439ca6c88e5155258859a3f74d96d45edddf48d965503ececb93eb53fc7f142fe414da3eda88ba4523a46646f71d86", 0x79, 0x0, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x1fb5, 0x7, 0xfffffffffffffc30, 0x9, @remote}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 18:41:34 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 368.186524] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.194332] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.221345] device bridge0 left promiscuous mode [ 368.898206] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.904814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.911597] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.917962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.925420] device bridge0 entered promiscuous mode 18:41:34 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000006000000000000000000000000e7ff000022665646dd8d1d0fd1765c6f3dff3b26ff542b54"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:35 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(0xffffffffffffffff, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 368.954829] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.961387] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.972262] device bridge0 left promiscuous mode 18:41:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfxplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 369.385069] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.391594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.398206] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.404647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.411334] device bridge0 entered promiscuous mode 18:41:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000280), 0x1000) 18:41:35 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:35 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x80, @time={0x0, 0x1c9c380}, 0x5, {0xecd1, 0x5}, 0x2, 0x13892476f43356ec, 0x95b4}) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000240)=0x24, 0x4) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r2 = dup2(r1, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x20800, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r0, &(0x7f0000000080), 0xffffff17) [ 369.430505] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.436981] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.461548] device bridge0 left promiscuous mode 18:41:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00c2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) getpeername$llc(r3, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10) write(r4, &(0x7f0000000200)="fa4aae982f8beebc078aaf623b1b0fd405920697bcb6d5e7d92df3154f61cfc1944128437aea6943cb516c972b3c99c9bff2f4ab24d2a4b7c3ca92053288", 0x3e) 18:41:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r1, &(0x7f0000301000)={0x2, 0x0, @rand_addr=0x80000001}, 0x10) shutdown(r1, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f000062fff8)={0x0, 0x2000000001}, 0x8) 18:41:35 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 369.888384] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.895157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.901992] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.908376] bridge0: port 1(bridge_slave_0) entered forwarding state 18:41:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfoplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:36 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 369.983996] device bridge0 entered promiscuous mode [ 369.997598] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.004172] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.020599] device bridge0 left promiscuous mode 18:41:36 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 370.298972] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.305597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.312342] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.319072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.325874] device bridge0 entered promiscuous mode 18:41:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f00000004c0)=""/4096) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:36 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsilus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:36 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:36 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 370.523503] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.530095] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.555605] device bridge0 left promiscuous mode 18:41:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0a85320, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0105303, &(0x7f00000002c0)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x100000000012}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000013) [ 370.995237] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.001765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.008459] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.014914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.026200] device bridge0 entered promiscuous mode 18:41:37 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:37 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs*lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:37 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x7, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f00000003c0)='\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000199697a6af7dc6440000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000000000000000000000000000000000000000000000000000000000000000002000000000000002c07fedfa8", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000022e883f68f4d9cc636e05e66720100000000ef000000000000000000000000000000fbfff1000000000000000000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000004c0)={0x1000000000000, 0x0, 0x0, "9ef17a8c5a0000c86760de884e9740474a13eea165c0322901dc6bd36cde2c014f9f91eeb7c37c7340f4dbcda6dc4d00"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:37 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000200)={0x2c, @empty, 0x4e21, 0x4, 'fo\x00', 0x13, 0xfffffffffffffffa, 0x64}, 0x2c) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="0099ba43e6d705000000000000a5155c88d7fa96f400000000000040000000000000000000000000000000000004"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$BLKRRPART(r1, 0x125f, 0x0) prctl$setfpexc(0xc, 0x2) ioctl$FICLONE(r1, 0x40049409, r2) [ 371.304115] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.310779] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.340602] device bridge0 left promiscuous mode 18:41:37 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = accept$alg(r0, 0x0, 0x0) socketpair(0x8, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x4e20, @rand_addr}}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="1779d6f58a866550110ef34461e1d48362561caa4a6561658ecde76b96ba803aec8a91a6ea0025a38cb9d5a325289342cf7b326985251a674253da7910d07bc84d6c1e798e0a1fe58b2c5df59eda1edcd8e317112fe99f684b1d77860404a8db2a6684185edb4e890da18c7687020a2eb2c511b04725be2978b1ca317d9ac71742f264ba50", 0x85) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) 18:41:37 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:37 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 371.943843] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.950388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.957115] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.963555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.971065] device bridge0 entered promiscuous mode [ 371.983278] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d101ab327e901e374397b39e764eea"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 371.990930] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs.lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 372.016388] device bridge0 left promiscuous mode 18:41:38 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:38 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 372.830241] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.836751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.843520] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.849948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.860242] device bridge0 entered promiscuous mode 18:41:38 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 372.875785] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.882314] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.891693] device bridge0 left promiscuous mode 18:41:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRES16], 0x36a9) recvmmsg(r1, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000001d80)=""/98, 0x62}, {&(0x7f0000001e00)=""/171, 0xab}, {&(0x7f0000001fc0)=""/193, 0xc1}, {&(0x7f00000020c0)=""/114, 0x72}, {&(0x7f0000002140)=""/17, 0x11}, {&(0x7f0000002180)=""/74, 0xfffffd00}], 0x6, &(0x7f0000002280)=""/144, 0x90}}], 0x400000000000094, 0x0, &(0x7f0000000180)) [ 373.310948] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.317397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.324161] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.330611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.339281] device bridge0 entered promiscuous mode 18:41:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs%lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1000007f, &(0x7f0000000140)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) write$UHID_GET_REPORT_REPLY(r4, &(0x7f00000001c0)={0xa, 0x6, 0x8, 0x3795}, 0xa) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) rt_sigpending(&(0x7f0000000200), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 18:41:39 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 373.386670] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.393258] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:39 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 373.458721] device bridge0 left promiscuous mode 18:41:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) 18:41:39 executing program 2: clone(0x2000000210007f6, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r0 = getpid() r1 = epoll_create(0x2c04) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xc, 0x31, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0x40046205, &(0x7f00000002c0)={0x260d01610d135c37, 0x0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)}) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) fremovexattr(r1, &(0x7f0000000300)=@random={'security.', '/dev/ppp\x00'}) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 18:41:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@nat={'nat\x00', 0x19, 0x2, 0x230, [0x20000040, 0x0, 0x0, 0x20000070, 0x200001d0], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'syzkaller0\x00', 'bcsf0\x00', 'team_slave_0\x00', 'veth1_to_bridge\x00', @link_local, [], @empty, [], 0x70, 0xa8, 0xf8}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x11}, 0xfffffffffffffffd}}}]}, @common=@log={'log\x00', 0x28, {{0xb4, "347c8261fe129b9067fe835e5a03780471d1f745094635834abfc9d1285a", 0xc}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'gretap0\x00', 'bpq0\x00', 'veth1_to_bond\x00', 'bpq0\x00', @empty, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@remote}}}}]}]}, 0x2a8) 18:41:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff), 0x0, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r1, &(0x7f0000301000)={0x2, 0x0, @rand_addr=0x80000001}, 0x10) [ 373.935688] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 374.000035] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.006537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.013314] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.019759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.028485] device bridge0 entered promiscuous mode [ 374.039270] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:40 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 374.046751] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:40 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 374.092237] device bridge0 left promiscuous mode [ 374.478225] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.484673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.491412] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.497790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.505579] device bridge0 entered promiscuous mode 18:41:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs\nlus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:40 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000070bb820ff1ca098476829ec28481695f4d240f350f4523c410be80048364d2ffff280e26020d194dc8c7387863365c46d59f01aa3200c309186a008d4f9732a9bb38083e02f09197f4086352588d281d890ee0d8b94be8a8480ea5c942a405027dae6a3a1f67879fb50a6a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:40 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 374.524691] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.532736] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.555359] device bridge0 left promiscuous mode 18:41:41 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 375.104758] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.111377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.118049] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.124473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.131360] device bridge0 entered promiscuous mode [ 375.138392] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.144996] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.157637] device bridge0 left promiscuous mode [ 375.572407] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.579031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.585787] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.592179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.598829] device bridge0 entered promiscuous mode 18:41:41 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:41 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:41 executing program 2: chdir(&(0x7f0000000240)='./file0\x00') symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') [ 375.621131] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.627610] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.635179] device bridge0 left promiscuous mode 18:41:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff), 0x0, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r1, &(0x7f0000301000)={0x2, 0x0, @rand_addr}, 0x10) 18:41:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e61740000000400000000000000000000000000000200000000000000000000004ccf5d726200344f0000000000000000000000000000000000000000000000f3ffffff00000000000000000000000000000000000003000000000000000000000000c934c53ce21cea93f43593cdf354fe2d5224b8b09147e10a4a5e4b5c651454e60a04032000b42a535fae4b858e659827d12964970100aafda7e565560942a65300cd231fd7c1141ed208631ec401510f16d0c2e11867560a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 375.989885] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.996336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.003075] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.009413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.016925] device bridge0 entered promiscuous mode 18:41:42 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsolus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:42 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 376.057100] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.064546] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.090432] device bridge0 left promiscuous mode 18:41:42 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 376.668619] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.675077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.681804] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.688195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.694992] device bridge0 entered promiscuous mode [ 376.704175] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.710684] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.727496] device bridge0 left promiscuous mode 18:41:42 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 377.033116] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.039587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.046357] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.052785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.062862] device bridge0 entered promiscuous mode 18:41:43 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="00be4400000000000000000000001e0000000000000000000000000000000000000000000000004000000057982500000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:43 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsulus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0011a77e7f04c32b64d742d7020000000000000000000000000000000000000000000000000000000000002000100000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 377.257520] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.264351] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:43 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:43 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:43 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 377.783589] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.790089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.796782] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.803225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.841767] device bridge0 entered promiscuous mode [ 377.849742] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.856285] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.868460] device bridge0 left promiscuous mode 18:41:43 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:44 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:44 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs0lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 378.310214] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.316907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.323666] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.330089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.347165] device bridge0 entered promiscuous mode 18:41:44 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:44 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 378.363053] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.369580] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.388114] device bridge0 left promiscuous mode 18:41:44 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000140)=0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x7, 0x400, 0x0, 'queue1\x00', 0x1}) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000004c0)=""/4096) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:44 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 378.876091] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.882573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.889271] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.895739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.913251] device bridge0 entered promiscuous mode [ 378.922306] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.928758] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:45 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:45 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 378.987099] device bridge0 left promiscuous mode 18:41:45 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 379.353002] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.359451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.366171] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.372579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.379336] device bridge0 entered promiscuous mode [ 379.394429] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:45 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:45 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsclus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 379.402747] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:45 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x400, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d", 0x4}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000004c0)={0x5, 0xb548, 0xc6, 0x401, 0xf4, 0x8}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 379.471481] device bridge0 left promiscuous mode [ 380.239327] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.245891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.252651] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.259021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.265825] device bridge0 entered promiscuous mode [ 380.281500] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:46 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 380.288040] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:46 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 380.329968] device bridge0 left promiscuous mode 18:41:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs-lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 380.707999] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.714451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.721209] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.727560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.735233] device bridge0 entered promiscuous mode 18:41:46 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:46 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x3, 0x2, 0x3ff, 0x3, 0x8}}) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000140)={0xc000000, 0x8, 0x3a}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x200) r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x401, 'queue1\x00', 0x8}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="000000000000000000000020000000000000000000000000000800000000000000000000000000000000000000004000793448d646c153b79e6e892d74944f0df845d383bcb6864d625c2d1a1700f3d72fb21e"], @ANYBLOB="0000000000000000000000000000000000000000000000000000000072de95ad0000000000001a00"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:46 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}]}, 0x88) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 380.753037] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.759574] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.786537] device bridge0 left promiscuous mode [ 380.923456] Unknown ioctl 1077171216 [ 380.927498] Unknown ioctl -1072143302 [ 381.192781] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.199224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.205983] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.212399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.220335] device bridge0 entered promiscuous mode [ 381.233726] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:47 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:47 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 381.240248] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.250973] Unknown ioctl 1077171216 [ 381.255017] Unknown ioctl -1072143302 [ 381.281388] device bridge0 left promiscuous mode [ 381.539311] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.545964] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.556297] device bridge0 left promiscuous mode [ 381.759544] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.766076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.772830] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.779214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.785983] device bridge0 entered promiscuous mode [ 381.792391] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.798851] bridge0: port 2(bridge_slave_1) entered forwarding state 18:41:47 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 381.805568] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.811996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.826080] device bridge0 entered promiscuous mode 18:41:47 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsdlus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 381.860275] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.867632] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) tkill(r5, 0x39) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0xffff, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) dup2(r2, r1) 18:41:47 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 381.938091] device bridge0 left promiscuous mode 18:41:48 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 382.488964] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.495553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.502303] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.508681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.515533] device bridge0 entered promiscuous mode [ 382.524700] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.531287] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.547397] device bridge0 left promiscuous mode [ 382.769500] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.775942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.782679] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.789062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.789599] device bridge0 entered promiscuous mode [ 382.810115] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:48 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 382.816679] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.825116] device bridge0 left promiscuous mode 18:41:49 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0xfffffffffffffffd) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 383.050070] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.056538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.063283] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.069722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.095439] device bridge0 entered promiscuous mode 18:41:49 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 383.109973] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.116510] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.132305] device bridge0 left promiscuous mode [ 383.440084] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.446492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.453255] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.459595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.466952] device bridge0 entered promiscuous mode [ 383.481746] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:49 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsllus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 383.488277] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.502414] device bridge0 left promiscuous mode [ 383.787977] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.794562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.801311] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.807716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.814541] device bridge0 entered promiscuous mode 18:41:49 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x0, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:49 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 383.832209] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.839769] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.872005] device bridge0 left promiscuous mode [ 384.160427] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.166908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.173660] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.180083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.187962] device bridge0 entered promiscuous mode [ 384.197744] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.205237] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:50 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 384.234283] device bridge0 left promiscuous mode [ 384.564711] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.571108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.577750] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.584164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.590930] device bridge0 entered promiscuous mode [ 384.607612] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:50 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:50 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x0, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 384.614194] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.630050] device bridge0 left promiscuous mode 18:41:51 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 384.973526] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.980015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.986705] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.993132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.000266] device bridge0 entered promiscuous mode [ 385.010892] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.017448] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsxlus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 385.038179] device bridge0 left promiscuous mode [ 385.314169] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.320587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.327261] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.333717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.340489] device bridge0 entered promiscuous mode [ 385.352291] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:51 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:51 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x0, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 385.360110] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.370570] device bridge0 left promiscuous mode 18:41:51 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 385.712662] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.719199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.725950] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.732387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.739107] device bridge0 entered promiscuous mode [ 385.746604] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.753264] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.770948] device bridge0 left promiscuous mode [ 386.040531] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.047048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.053789] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.060240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.066951] device bridge0 entered promiscuous mode [ 386.082293] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x1f, 0x9, 0x3, 'queue1\x00', 0x2}) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:52 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:52 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x0, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 386.089760] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.123762] device bridge0 left promiscuous mode [ 386.492264] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.498653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.505390] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.511809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.518764] device bridge0 entered promiscuous mode 18:41:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs#lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:52 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x0, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 386.537508] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.543966] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.550933] device bridge0 left promiscuous mode [ 386.874152] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.880732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.887457] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.893908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.901353] device bridge0 entered promiscuous mode [ 386.916422] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:52 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:52 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)) syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r0, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 386.924529] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x89}, &(0x7f0000000300)=0x8) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000540)=r1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000004c0)={r2}, &(0x7f0000000500)=0x8) r3 = dup2(r0, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="00002d020000000000000000f38fd77eb684ed00000000000000009a0000000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0x8, 0x0, 0x9, 0x1bd, 0x0, 0x5, 0x4000, 0x5, 0x9, 0x3, 0xfffffffffffffff9, 0xfffffffffffffff7, 0x101, 0x8, 0x81, 0x59, 0x3, 0x800, 0x80, 0x7, 0x9, 0xfffffffffffffffb, 0x7, 0x3, 0x6, 0x3, 0x75, 0x2, 0xfff, 0x8000, 0x6, 0x0, 0x7fff, 0x8001, 0x101, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x8, 0x3, 0x1000, 0x0, 0x5, 0x8, 0x26}, r1, 0xa, r0, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x2082, 0x0) [ 386.975301] device bridge0 left promiscuous mode [ 387.078888] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 387.291772] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.298316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.305066] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.311501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.318208] device bridge0 entered promiscuous mode [ 387.325455] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.331888] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:53 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 387.341823] device bridge0 left promiscuous mode [ 387.581091] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.587725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.594463] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.600896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.607653] device bridge0 entered promiscuous mode [ 387.618103] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:53 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:53 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 387.619316] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 387.624658] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.639893] device bridge0 left promiscuous mode 18:41:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsXlus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 387.917495] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.924064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.930832] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.937221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.944024] device bridge0 entered promiscuous mode [ 387.953969] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.961350] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:54 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 387.980167] device bridge0 left promiscuous mode [ 388.417406] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.423995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.430771] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.437153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.444519] device bridge0 entered promiscuous mode [ 388.454321] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb89b6aa7042edf169529458b129350fb0b068d9a80300000000000000f743087cee5c3145735f7e4fc3516bc8b9ca1566ac4e86e495cb1e75864bcc7e98835914bbb56c71d3ec45ebb9e4c7eed3174480e0d81e8928e75c8a3b0d6ba709ffc3e2922285d2be6e4c2ebae6b1fcb2de83d0b1055fecadf7eacbdd11a8b750d007061d1bfb2ee8bb6e2bc0fa90bdf80b2c603deb3c973b2b5c1f472396c6"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:41:54 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000000080), 0xffffff17) [ 388.462304] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.471264] device bridge0 left promiscuous mode 18:41:54 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:54 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 388.862256] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.868780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.875549] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.881992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.894605] device bridge0 entered promiscuous mode 18:41:54 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:54 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x0, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 388.914896] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.921469] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.941244] device bridge0 left promiscuous mode 18:41:55 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 389.276314] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.282781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.289495] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.295933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.303139] device bridge0 entered promiscuous mode 18:41:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x408000000, 0x4000) write$nbd(r1, &(0x7f00000004c0)={0x67446698, 0x1, 0x4, 0x3, 0x1, "54d184d8fe4c4b5b467abab54cc3339e1801a9f0785e3b3e05c2a4780dcea948744c2ddd3c2892dec4cfff9694ad80a2176059a41ce7574957399ace47d468bfdea3c61a0e74d662321e938acc9fd567fa1377d248790a36c9fdd840bcf3b41065af1bff04b7b044f0a303c172f22f3c33e2422d80fd674909d96904001496e6194d166fc453fb24a7b759db92f2"}, 0x9e) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000140)={0x2000}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:41:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfs+lus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:41:55 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 389.330513] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.336996] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.350057] device bridge0 left promiscuous mode 18:41:55 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:55 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 389.777683] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.784241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.790991] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.797350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.804956] device bridge0 entered promiscuous mode [ 389.815794] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:55 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:55 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x0, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 389.822318] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.840654] device bridge0 left promiscuous mode [ 390.115655] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.122439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.131511] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.138381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.147643] device bridge0 entered promiscuous mode 18:41:56 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 390.172856] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.183238] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:56 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 390.717052] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.723548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.730288] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.736654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.743781] device bridge0 entered promiscuous mode 18:41:56 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:41:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$KDMKTONE(r2, 0x4b30, 0x5) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) 18:41:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsslus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 390.780446] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.786930] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.851307] device bridge0 left promiscuous mode [ 391.222002] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.228466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.235212] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.241638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.248381] device bridge0 entered promiscuous mode [ 391.255345] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.261895] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:57 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0x0, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 391.270792] device bridge0 left promiscuous mode [ 391.494022] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.500574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.507198] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.513642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.520482] device bridge0 entered promiscuous mode [ 391.527423] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.533927] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:57 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 391.540498] device bridge0 left promiscuous mode [ 391.818160] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.824682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.831427] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.837799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.844648] device bridge0 entered promiscuous mode [ 391.851859] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.858356] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:57 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 391.876066] device bridge0 left promiscuous mode [ 392.110015] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.116434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.123170] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.129557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.136317] device bridge0 entered promiscuous mode [ 392.145123] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.151610] bridge0: port 1(bridge_slave_0) entered disabled state 18:41:58 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 392.166344] device bridge0 left promiscuous mode 18:41:58 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 392.377295] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.383811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.390580] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.396966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.403843] device bridge0 entered promiscuous mode [ 392.412360] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.420197] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.435613] device bridge0 left promiscuous mode 18:41:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x58000) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000004c0)={0x2, 0x0, @pic={0x1ff, 0x4, 0x7, 0x7, 0x6, 0xff, 0xfffffffffffffffe, 0x8000, 0x10001, 0x8, 0x3, 0x1, 0x7, 0x80000001, 0x4, 0x8}}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000640)={r2, 0x4, &(0x7f0000000240)=[0x5, 0x5, 0x100, 0x7], &(0x7f0000000300)=[0x59b4, 0x3f, 0x3, 0x1, 0xa, 0x80, 0x8, 0x3, 0x80000000, 0x2b26], 0x20, 0x1, 0x7f, &(0x7f00000005c0)=[0x1], &(0x7f0000000600)=[0x806d, 0xf807, 0x7aa]}) r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:41:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp#us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 392.653055] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.659560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.666304] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.672723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.687845] device bridge0 entered promiscuous mode 18:41:58 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 392.711140] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.718799] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.737558] device bridge0 left promiscuous mode 18:41:59 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 393.003275] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.009830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.016433] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.022857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.029590] device bridge0 entered promiscuous mode [ 393.038581] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.045190] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.056302] device bridge0 left promiscuous mode 18:41:59 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 393.272081] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.278616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.285396] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.291788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.298614] device bridge0 entered promiscuous mode [ 393.306972] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.313520] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.332697] device bridge0 left promiscuous mode [ 393.566019] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.572519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.579124] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.585566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.592555] device bridge0 entered promiscuous mode [ 393.609069] bridge0: port 2(bridge_slave_1) entered disabled state 18:41:59 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x0, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 393.615641] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.645632] device bridge0 left promiscuous mode 18:41:59 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 393.854859] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.861406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.868047] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.874474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.882848] device bridge0 entered promiscuous mode [ 393.890804] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.897351] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.919931] device bridge0 left promiscuous mode 18:42:00 executing program 3: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 394.119942] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.126417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.133157] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.139546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.146300] device bridge0 entered promiscuous mode [ 394.155644] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.162238] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.175463] device bridge0 left promiscuous mode [ 394.387571] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.394097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.400838] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.407209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.414031] device bridge0 entered promiscuous mode 18:42:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) memfd_create(&(0x7f0000000140)='queue1\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp*us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:00 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 394.433342] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.441320] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.476844] device bridge0 left promiscuous mode [ 394.777576] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.784141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.790918] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.797296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.804460] device bridge0 entered promiscuous mode [ 394.812765] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.819334] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:00 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x0, 0x1, 'syz0\x00', &(0x7f0000000180), 0x0, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 394.829851] device bridge0 left promiscuous mode [ 395.056128] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.062642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.069320] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.075743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.082907] device bridge0 entered promiscuous mode [ 395.089824] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.096271] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:01 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000), 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 395.109898] device bridge0 left promiscuous mode [ 395.345680] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.352132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.358819] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.365265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.374723] device bridge0 entered promiscuous mode [ 395.382275] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.388688] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:01 executing program 3 (fault-call:13 fault-nth:0): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 395.395354] device bridge0 left promiscuous mode [ 395.503328] FAULT_INJECTION: forcing a failure. [ 395.503328] name failslab, interval 1, probability 0, space 0, times 0 [ 395.515021] CPU: 1 PID: 16115 Comm: syz-executor3 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 395.523524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.532881] Call Trace: [ 395.535498] dump_stack+0x1d3/0x2c4 [ 395.539142] ? dump_stack_print_info.cold.2+0x52/0x52 [ 395.544343] ? __lock_acquire+0x7ec/0x4ec0 [ 395.548599] should_fail.cold.4+0xa/0x17 [ 395.552675] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.557794] ? lock_release+0x970/0x970 [ 395.561780] ? ttwu_stat+0x5c0/0x5c0 [ 395.565509] ? print_usage_bug+0xc0/0xc0 [ 395.569579] ? graph_lock+0x170/0x170 [ 395.573395] ? graph_lock+0x170/0x170 [ 395.577215] ? find_held_lock+0x36/0x1c0 [ 395.581292] ? __lock_is_held+0xb5/0x140 [ 395.585376] ? ttwu_stat+0x5c0/0x5c0 [ 395.589112] __should_failslab+0x124/0x180 [ 395.593361] should_failslab+0x9/0x14 [ 395.597178] kmem_cache_alloc_node_trace+0x270/0x740 [ 395.602292] ? lock_downgrade+0x900/0x900 [ 395.606453] ? check_preemption_disabled+0x48/0x200 [ 395.611490] __get_vm_area_node+0x130/0x3a0 [ 395.615827] __vmalloc_node_range+0xc4/0x750 [ 395.620252] ? snd_seq_pool_init+0x8b/0x320 [ 395.624595] ? snd_seq_pool_init+0x8b/0x320 [ 395.628930] vmalloc+0x6f/0x80 [ 395.632141] ? snd_seq_pool_init+0x8b/0x320 [ 395.636471] snd_seq_pool_init+0x8b/0x320 [ 395.640635] snd_seq_write+0x7ad/0x8d0 [ 395.644543] ? snd_seq_client_enqueue_event+0x510/0x510 [ 395.645781] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.649921] ? proc_fail_nth_write+0x9e/0x210 [ 395.649941] ? proc_cwd_link+0x1d0/0x1d0 [ 395.649970] __vfs_write+0x119/0x9f0 [ 395.656312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.660772] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 395.660790] ? snd_seq_client_enqueue_event+0x510/0x510 [ 395.660807] ? kernel_read+0x120/0x120 [ 395.660833] ? apparmor_path_rmdir+0x30/0x30 [ 395.665048] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.668602] ? apparmor_file_permission+0x24/0x30 [ 395.675146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.679993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.680014] ? security_file_permission+0x1c2/0x230 [ 395.680033] ? rw_verify_area+0x118/0x360 [ 395.686431] device bridge0 entered promiscuous mode [ 395.689261] vfs_write+0x1fc/0x560 [ 395.734439] ksys_write+0x101/0x260 [ 395.738054] ? __ia32_sys_read+0xb0/0xb0 [ 395.742107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.747633] ? trace_hardirqs_off_caller+0x300/0x300 [ 395.752730] ? ksys_ioctl+0x81/0xd0 [ 395.756346] __x64_sys_write+0x73/0xb0 [ 395.760225] do_syscall_64+0x1b9/0x820 [ 395.764104] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 395.769454] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.774374] ? trace_hardirqs_off+0x310/0x310 [ 395.778854] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.783857] ? recalc_sigpending_tsk+0x180/0x180 [ 395.788605] ? kasan_check_write+0x14/0x20 [ 395.792833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.797666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.802842] RIP: 0033:0x457679 [ 395.806026] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.824912] RSP: 002b:00007fde1711ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 395.832608] RAX: ffffffffffffffda RBX: 00007fde1711b6d4 RCX: 0000000000457679 [ 395.839867] RDX: 00000000ffffff17 RSI: 0000000020000080 RDI: 0000000000000006 [ 395.847129] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 18:42:01 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 395.854383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 395.861638] R13: 00000000004d8d48 R14: 00000000004c5644 R15: 0000000000000000 [ 395.869466] syz-executor3: vmalloc: allocation failure: 24000 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 395.879921] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.886471] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.893429] device bridge0 left promiscuous mode [ 395.911611] syz-executor3 cpuset=syz3 mems_allowed=0 [ 395.916782] CPU: 0 PID: 16115 Comm: syz-executor3 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 395.925279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.934635] Call Trace: [ 395.937247] dump_stack+0x1d3/0x2c4 [ 395.940903] ? dump_stack_print_info.cold.2+0x52/0x52 [ 395.946120] warn_alloc.cold.121+0xb7/0x1bd [ 395.950456] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 395.955307] ? __get_vm_area_node+0x130/0x3a0 [ 395.959815] ? rcu_read_lock_sched_held+0x108/0x120 [ 395.964843] ? lock_downgrade+0x900/0x900 [ 395.968998] ? check_preemption_disabled+0x48/0x200 [ 395.974032] ? __get_vm_area_node+0x2e5/0x3a0 [ 395.978538] __vmalloc_node_range+0x472/0x750 [ 395.983053] ? snd_seq_pool_init+0x8b/0x320 [ 395.987379] vmalloc+0x6f/0x80 [ 395.990581] ? snd_seq_pool_init+0x8b/0x320 [ 395.994914] snd_seq_pool_init+0x8b/0x320 [ 395.999073] snd_seq_write+0x7ad/0x8d0 [ 396.002976] ? snd_seq_client_enqueue_event+0x510/0x510 [ 396.008348] ? proc_fail_nth_write+0x9e/0x210 [ 396.012852] ? proc_cwd_link+0x1d0/0x1d0 [ 396.016935] __vfs_write+0x119/0x9f0 [ 396.020655] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 396.025592] ? snd_seq_client_enqueue_event+0x510/0x510 [ 396.030958] ? kernel_read+0x120/0x120 [ 396.034856] ? apparmor_path_rmdir+0x30/0x30 [ 396.039290] ? apparmor_file_permission+0x24/0x30 [ 396.044138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.049680] ? security_file_permission+0x1c2/0x230 [ 396.054707] ? rw_verify_area+0x118/0x360 [ 396.058859] vfs_write+0x1fc/0x560 [ 396.062415] ksys_write+0x101/0x260 [ 396.066052] ? __ia32_sys_read+0xb0/0xb0 [ 396.070115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.075660] ? trace_hardirqs_off_caller+0x300/0x300 [ 396.080768] ? ksys_ioctl+0x81/0xd0 [ 396.084402] __x64_sys_write+0x73/0xb0 [ 396.088302] do_syscall_64+0x1b9/0x820 [ 396.092196] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 396.097574] ? syscall_return_slowpath+0x5e0/0x5e0 [ 396.102512] ? trace_hardirqs_off+0x310/0x310 [ 396.107016] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 396.112036] ? recalc_sigpending_tsk+0x180/0x180 [ 396.116799] ? kasan_check_write+0x14/0x20 [ 396.121046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.125908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.131098] RIP: 0033:0x457679 [ 396.134296] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.153197] RSP: 002b:00007fde1711ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.160917] RAX: ffffffffffffffda RBX: 00007fde1711b6d4 RCX: 0000000000457679 [ 396.168185] RDX: 00000000ffffff17 RSI: 0000000020000080 RDI: 0000000000000006 [ 396.175458] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 396.183233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 396.190504] R13: 00000000004d8d48 R14: 00000000004c5644 R15: 0000000000000000 [ 396.204543] Mem-Info: [ 396.207011] active_anon:124345 inactive_anon:379 isolated_anon:0 [ 396.207011] active_file:9146 inactive_file:11502 isolated_file:0 [ 396.207011] unevictable:0 dirty:156 writeback:0 unstable:0 [ 396.207011] slab_reclaimable:12330 slab_unreclaimable:102793 [ 396.207011] mapped:55286 shmem:389 pagetables:1691 bounce:0 [ 396.207011] free:1282932 free_pcp:907 free_cma:0 [ 396.271664] Node 0 active_anon:497380kB inactive_anon:1516kB active_file:36584kB inactive_file:46008kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:221144kB dirty:624kB writeback:0kB shmem:1556kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 374784kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 396.300791] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 396.330585] lowmem_reserve[]: 0 2815 6318 6318 [ 396.335224] Node 0 DMA32 free:2885836kB min:30036kB low:37544kB high:45052kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2887232kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1396kB local_pcp:68kB free_cma:0kB [ 396.363732] lowmem_reserve[]: 0 0 3503 3503 [ 396.368107] Node 0 Normal free:2229752kB min:37376kB low:46720kB high:56064kB active_anon:497480kB inactive_anon:1516kB active_file:36584kB inactive_file:46008kB unevictable:0kB writepending:624kB present:4718592kB managed:3587504kB mlocked:0kB kernel_stack:7584kB pagetables:6764kB bounce:0kB free_pcp:2096kB local_pcp:872kB free_cma:0kB [ 396.400916] lowmem_reserve[]: 0 0 0 0 [ 396.404882] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 396.419385] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 3*16kB (M) 2*32kB (M) 3*64kB (M) 1*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 3*2048kB (M) 702*4096kB (M) = 2885836kB [ 396.435307] Node 0 Normal: 4620*4kB (UME) 554*8kB (UME) 309*16kB (UME) 261*32kB (UME) 11*64kB (UME) 37*128kB (UME) 49*256kB (UME) 35*512kB (UM) 5*1024kB (UME) 1*2048kB (U) 525*4096kB (M) = 2229680kB [ 396.453931] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 396.463507] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 396.472712] 21036 total pagecache pages [ 396.476860] 0 pages in swap cache [ 396.480828] Swap cache stats: add 0, delete 0, find 0/0 [ 396.486357] Free swap = 0kB [ 396.489522] Total swap = 0kB [ 396.493224] 1965979 pages RAM [ 396.496483] 0 pages HighMem/MovableOnly [ 396.498725] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.501104] 343318 pages reserved [ 396.506913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.507132] bridge0: port 1(bridge_slave_0) entered blocking state 18:42:02 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 396.511000] 0 pages cma reserved [ 396.516962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.517517] device bridge0 entered promiscuous mode [ 396.549305] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.555780] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.562398] device bridge0 left promiscuous mode [ 396.765951] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.772449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.779090] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.785523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.792190] device bridge0 entered promiscuous mode 18:42:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp0us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 396.811482] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.819124] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x8000000000004, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f00000016c0)="c1a355f5776a4847cafc1cead8ab493d77c085a07451924756c50ad30cafd1fdd573e5c811a572f2633d45ba989ae95813697f76e35fb0ff074483f9fcd5f1fba7c8484c2d4b3839a978590b75b45a47d71d0ee36d0621574d6b367a5e020d92e87e1d8a1f9436939651fa9636f2e9b0d6a89eca36360837124334ca02abd2da8530c2c7db12bca9254d3801d9d76436fcd14ce7638b020709f4f37166ae0190ebd62d98fca50f864ef2282738d4e3b7bd61b8336919b889bd0e58b14760c07679028e1b97269af1dd05240f51bb3a967c0962e188c3f45482cea08c611e141ea7ad1e45b947a1", 0xe7, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) recvfrom$packet(r2, &(0x7f0000000280)=""/4096, 0x1000, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x4, 0xa, [0x4c91db5c, 0x1e5f, 0x1, 0x6, 0x3, 0x8, 0x40, 0x3, 0x3, 0x6]}, &(0x7f0000000100)=0x1c) sendto$inet(r0, &(0x7f0000001280)="5f838d0b155cccd107819818fc16958f1af50a88658063b19260da4b0f35e2a6726a412c3d1de02375dfadbded6056c9f011f66b77a28f26e0fc070bae03d28bc2d5b23882230a4cc97ce1ee3df8e86a41bd58f71e365801a5d75ce96dce820b73a903b65098bd406bb30b0892183149ad7f3a26d530262002a7838496ec0fc968565a2dc864963b939c49bb25375912a1d670575ffb6ba31de316c41f9b1e96f89caba80882b76d55632e30b18a88b6982d0227dd715f3a64a633a721b419d1ee14214e2a692691ce64163f050e750f6e04dbeddbb4cb8f2bd9c15a54581eb05b066fd4d3a7e5", 0xe7, 0x0, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r3, 0xa, "f81d75bb9d0d448a5d4f"}, &(0x7f0000000180)=0x12) ppoll(&(0x7f0000000200)=[{r2}, {r2}], 0x2, &(0x7f0000001440), &(0x7f0000001480), 0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000001380)={0x4, 0x8000, 0x200}) 18:42:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x14000, 0x100) sendmsg$inet_sctp(r1, &(0x7f0000000240)={&(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000200)=[{&(0x7f00000004c0)="c774ad61cf6db37dde417ff87fc4e2c4e2bd25cfcb1926e57e71b2019b30d89014d7bb05c2f77b9eb66f1ff3f98eb62aaffbef590c7ea28e96de05e82786c61f2bb352438c8380ee8c5e9e2da7000a6aad2e76e46f1416fbac6ec46d58b58a3a413845570099ec8d378686b98d9c5227fbf80efb5630f853d4f7c97a5a958acce60f670be27a508ca2cf7bad8865f8b6172bf159", 0x94}, {&(0x7f0000000580)="44f5bb188b31f5ef115978cbcfc405c657247c0c5c1ed2335184e02071887085c653fff19b8065800ade46c40a3aefa57430dc346c4eacadeb1c16d6083faad8e29d9f9e1027f4012ca5fa19bc787f0305c63fb11ac329cf68e287aafab1cbe11bd5c7062448467df277c3e18bbac7885bcc9496301a0b17b3f26a49a278c788f658e352e694a866d7f0edbeede8eee88e32869e59e497632d2449d146ab48117e9876abbbf492f3b0443ead2c91d8864f00e71572c88d657e5d61c2c5664b69b641249f77d3d4a79c325db26c738ecfac1e6ef377e94a", 0xd7}], 0x2, &(0x7f0000000680)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x2}}, @init={0x18, 0x84, 0x0, {0x4b, 0x6, 0x2, 0x2}}, @init={0x18, 0x84, 0x0, {0xfffffffffffffff7, 0x5, 0x9, 0x1}}, @authinfo={0x18, 0x84, 0x6, {0x1f}}, @authinfo={0x18, 0x84, 0x6, {0x80000001}}], 0x78, 0x20000000}, 0x40) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:42:02 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 396.857654] device bridge0 left promiscuous mode [ 397.230442] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.237001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.243752] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.250180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.266339] device bridge0 entered promiscuous mode 18:42:03 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x0, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 397.277064] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.285135] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.302185] device bridge0 left promiscuous mode [ 397.576448] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.582902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.589528] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.595949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.602916] device bridge0 entered promiscuous mode [ 397.614895] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:03 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x0, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:03 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0x11fffff97) 18:42:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f00000001c0)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) fcntl$setstatus(r1, 0x4, 0x2400) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 397.622547] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.646015] device bridge0 left promiscuous mode 18:42:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp%us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 398.267994] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.274521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.281268] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.287635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.294408] device bridge0 entered promiscuous mode [ 398.310023] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:04 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:04 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 398.316941] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.334276] device bridge0 left promiscuous mode [ 398.620446] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.626898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.633650] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.640071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.647521] device bridge0 entered promiscuous mode 18:42:04 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x0, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:04 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r6, 0xc0305710, &(0x7f0000000240)={0x1, 0x1, 0x9, 0x4}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 398.671874] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.678435] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.706589] device bridge0 left promiscuous mode [ 398.991582] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.998094] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.005226] device bridge0 left promiscuous mode [ 399.186794] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.194084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.202107] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.208495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.215275] device bridge0 entered promiscuous mode [ 399.222766] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.229261] bridge0: port 2(bridge_slave_1) entered forwarding state 18:42:05 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x0, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 399.235998] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.242398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.257601] device bridge0 entered promiscuous mode 18:42:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x101806) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000950000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 399.281672] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.289182] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.302827] device bridge0 left promiscuous mode 18:42:05 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp+us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:05 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x0, 0x7f}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000700)={0x7fff, 0x80000001, 0x2, 0x0, 0x100, 0x6, 0x9, 0x7, r2}, 0x20) r3 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r3, &(0x7f00000001c0)=[{&(0x7f0000000400)="8d5cc8a2f81e776428c54c48ebe04918035a198917cbfb840c49abfec0ac1384b9e1566f1cf3b9854993947ebcb7c7ccd0cd5dea485e62a1f101923372a3150391b8f8df3e281847a10c886a549b7624d18e3964d7f34ae1cf0c019f6f0e93f2a5e0c63f3eabae892b1eee03328e1ec53b3d7e81af58128b0c2cf86cea0b0e869df604bddabd092e584f6c2e79425339b2d078a4bff3566bb1637e51ef69b638712e65ecbda67eb5b853b540a85d4ca4dc6cffe33029a73763c051628bdf088bd8727b89217d3b07b32634e97fab76ff7b87779d8a9b0288cd91d0b33a2a7c94ebd528123c8f32c9282ab481fb", 0xed}, {&(0x7f0000000500)="93ebe83a3586854f27e14a8cc26f1563fb892a3da846f2d9c5df07c2d52061fe83e248bb7e0ac49a0608537362a9f858bc8f86a88e2c994f06fa1cb85003bc73556dc65a30c048b6fdb4dcdb48b9d3b1a57c179a620934d586ba1238a56506", 0x5f}, {&(0x7f0000000580)="5193c9973b81c717f0e81b54a2baa8cb8b0f56d39b12291b3a4cd8a8b83f666d8a4eb797b7243d8665c61d41728bcb5d95ccede5d2718e19be9e7be2edc3adf1725723e9dbf1ac76d98bc3", 0x4b}, {&(0x7f0000000600)="8bac66af96a8a32c144f2db587f8a0c87ca5f967978f8104e67b1b9053640671f1156ed8bb9460a409afa8b5ee8ee6127fcce3e238230e26dda70ddaf4fe38101f0da594829eec6a9b7a645554af7c0fdb419a32e5493e03c7fb7dae9f6fa2e4d6c083e4e0450cd34150098261a526d3c5b3bd945761cfb0e71e914e239597da0011fedfe219fba19f2b18a42e9d3f74621f700f6c83811c1ea6867ed66521632174b280a2d1e355be6d3c9adeb0c43426db77fa64572de7375542360b865394af10ee49b240fc6347145fdbc9646ca615c154a2da5158a75cd519fbf9eb2d7120bddca741711d01b8", 0xe9}], 0x4, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000a80)={0x8001, 0x200, 0x4, 0x101, 0x1, [{0x81, 0x2a9c, 0x9, 0x0, 0x0, 0x404}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000a40)=""/33) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000640)=ANY=[], 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x0) writev(r3, &(0x7f0000000980)=[{&(0x7f0000000740)="415166754ad5861d4737eae198b26487d8099dce19cb53be0ae7ed3d412d58d864fef6577c3c250beb137f51d5a4b40d887c6f9393b394626931fe45403cdf12926983d71c0810fa9a95136278ae887be4a1c93270de52ceab312b4a8a31ad9f9f4ca946d22881f6d8c4b54f09afe80627210b3708f9ff09f414bfbe511920405631f3c73f1718576d84d677f7cc6d5376db026c9a87c284c1bd29369c6ae2", 0x9f}, {&(0x7f0000000800)="5ea2788d6afeb55f82dee7180d678a271bb594ad4ddb5297b3be70c2a9e75f240e7e8559f29648e42dcacd3a9a48bbbef894ee1efc81c9f47d7303d367123ef4b38e7462c6457b5a52b334919ccfcb6a5632889b9c8f91fcf59f453c8404033fae858ea09874adc0c2757bdbada77b33fedd4fd59935f431c3974847490d2a041decfbce534c5fd3649237a9c5e85a68e471720c8f8a115d0594c0ad60496e2c85", 0xa1}, {&(0x7f00000008c0)="a122497cb0cb2923750220b8472ae4f6fc0e32aab520070c3026674f3c4396c632014bba0d6ce5bd17f6dea313a5c480c7f198bc9a76d3ed8f2e13fb635b408b5aa52fc7d9737ce5", 0x48}, {&(0x7f0000000940)="071911588e3badef4785e875d7ae86", 0xf}], 0x4) splice(r1, &(0x7f00000009c0), r3, &(0x7f0000000a00)=0x18, 0x7080000000000000, 0xe) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @multicast2}, {}, 0x20, {0x2, 0x4e23, @rand_addr=0x100}, 'veth0_to_team\x00'}) [ 399.770288] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.776723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.783484] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.789915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.799437] device bridge0 entered promiscuous mode [ 399.809534] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:05 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000300)=0x4, 0x4) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x4e21, 0x6, @empty, 0x1000}}, 0x1f, 0xffffffff, 0x7, "9f7ee40ce7a2b5b2cfea40567eafd2f2648a9e513f4b83528e1e26eae8134e9f83c9b108e5d61eebe50c8c82ff1eea96d389b2b046dfbdb3060b9e3379312a48c75cb5929d5bb917cadd553c3bf4fb52"}, 0xd8) r4 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x101803) r6 = dup2(r5, r4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r6, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r4, &(0x7f0000000080), 0xffffff17) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000a40)={0x3f, {{0x2, 0x4e22, @broadcast}}}, 0x88) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000180)) write$binfmt_aout(r3, &(0x7f00000005c0)={{0x108, 0x6, 0x10001, 0x141, 0x102, 0x7f, 0x38f, 0xffffffffffffffff}, "e4ce203ee175270149df89c7ce97c14cc1e4371cc38523f30bbc17128cc1e4c6ac", [[], [], [], []]}, 0x441) 18:42:05 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000), 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 399.816071] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.824359] device bridge0 left promiscuous mode [ 400.123909] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.130354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.137065] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.143488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.150285] device bridge0 entered promiscuous mode [ 400.160650] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:06 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x0, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:06 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x11, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="05870100000000000000db98926e630440"], 0x98, 0x0, &(0x7f00000001c0)="91006a1443461d8c4dd36b940930051d560fea853de938f84f9a3d957bf5d5fa8fe1e98cb304180d6f1b88fb17ab838ff60ed4edc4d62e0d1aaf5bf803eb92de351a4302aafd96fe529328194aeb0cd70d6091ef80aa79544b76b2f9d6932eaaec3b93d6698aa6796ee2005617ef81f03880125f450fa856ab7e32080e9b7bd914d2fcc0548c0a266a63b7478ca094b64ea81f17a6a6a9a9"}) r3 = dup2(r2, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x0, 0x0, &(0x7f00000006c0)}) [ 400.168101] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.191815] device bridge0 left promiscuous mode [ 400.298712] binder: 16248:16249 unknown command 100101 [ 400.304623] binder: 16248:16249 ioctl c0306201 20000180 returned -22 18:42:06 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x0, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 400.835655] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.842104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.848787] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.855229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.862063] device bridge0 entered promiscuous mode 18:42:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001200)={r0, &(0x7f0000000000), &(0x7f0000001240)=""/4096}, 0x13) 18:42:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000001c0)=0x132) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r4, &(0x7f0000000140)='statm\x00') setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000010000000000009900000000feffffff000000000000000000000000000000000000000000000000000000000000e0ffffffffffffff000000000000000000000000000000000000000000000000000002000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 400.901849] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.909589] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:06 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp-us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000ef5d00070000000000000000ecffffff00", @ANYRES32=r3, @ANYBLOB="0f0000000000000000000000"], 0x24}}, 0x0) [ 400.968357] device bridge0 left promiscuous mode [ 401.270831] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.277410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.284177] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.290604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.297441] device bridge0 entered promiscuous mode [ 401.310592] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:07 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f0000000240)) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 401.317047] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:07 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0x0, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 401.342004] device bridge0 left promiscuous mode [ 401.638658] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.645189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.654045] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.660925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.669318] device bridge0 entered promiscuous mode 18:42:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) write$P9_RGETLOCK(r4, &(0x7f0000000200)={0x1e, 0x37, 0x1, {0x3, 0x8, 0x32f6, r5}}, 0x1e) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) [ 401.712035] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.720243] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.743658] device bridge0 left promiscuous mode 18:42:07 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x0, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:08 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000580)={0x7, 0xba7, 0x10000, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 402.348759] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.355310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.362079] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.368439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.375208] device bridge0 entered promiscuous mode 18:42:08 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) clone(0x100000, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000002c0)={{0xff, @dev={0xac, 0x14, 0x14, 0x1d}, 0x4e23, 0x1, 'fo\x00', 0x1, 0x9, 0x26}, {@rand_addr=0x4, 0x4e23, 0x10003, 0xc7, 0xdcc, 0xffffffff00000001}}, 0x44) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc8, r2, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x618}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x18}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1e}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0xa}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x802c550a, &(0x7f0000000000)) 18:42:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp.us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 402.413961] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.421554] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:08 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, 0x0, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 402.516925] device bridge0 left promiscuous mode 18:42:08 executing program 2: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0x0, @mcast2, 0x2}, @in={0x2, 0x8, @dev={0xac, 0x14, 0x14, 0xc}}, @in6={0xa, 0x4e20, 0x8, @loopback, 0xff}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e24, 0xb5, @ipv4={[], [], @multicast2}, 0x9}], 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e21, 0x0, @remote, 0x1}, {0xa, 0x4e22, 0x414, @ipv4={[], [], @multicast2}, 0x5}, 0x8, [0x9, 0xced, 0x0, 0x1, 0xffffffffffffff01, 0x5, 0x9, 0x3]}, 0x5c) 18:42:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000fbffffffffffffff00000000000000000000000000000000000000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:08 executing program 2: r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(r0, 0x40000) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x0, &(0x7f00000002c0)) fchmodat(r0, &(0x7f0000000440)='./file1\x00', 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000003c0), 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x4, @local, 'ip6gretap0\x00'}}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x8000004010, r0, 0x2) lchown(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 403.030740] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.037180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.043966] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.050381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.077594] device bridge0 entered promiscuous mode 18:42:09 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x0, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 403.102189] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.108677] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.124165] device bridge0 left promiscuous mode 18:42:09 executing program 2: r0 = memfd_create(&(0x7f00000000c0)="c0873a2a18c16ba7875ba06f38aa4ba5d30b86ca3c7ffd368d7dd8f247b8ea936147d4fd1e42dc6062cebb4865299086e39608e0fab1d84eb257cb8d7d336c6d38a537c900484f41c86d4352fccb247533ecde25d05dd8eb448253173fd64173e3b19a46e6ba5bc7258820ee51529f818bdcc7dcde6dbe7f321129fbe0096d17d8da4034bd6a2a541e5ef76feedf0db8771de75fde87ddc1f0911a219cd30bc99564e32aa9fa999db8893ec9f216137b1a526f3a16002b24ed58b74b56715518e26bbd0e561614671bb0cf93", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(r0, 0x40000) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x0, &(0x7f00000002c0)) fchmodat(r0, &(0x7f0000000440)='./file1\x00', 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000003c0), 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x4, @local, 'ip6gretap0\x00'}}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x8000004010, r0, 0x2) lchown(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 403.508765] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.515352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.522112] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.528508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.535888] device bridge0 entered promiscuous mode 18:42:09 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000780)="785aae8489bd3aa718a93a11a32d27a14c2ace2bd86c3b229ddeb4153f62d997eb34c046b8f663fb1be92c1a986eca34617b54b80ac66f97e193b1") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000010000000000000000000000000076cd0231af000000000000000000"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) pselect6(0x40, &(0x7f0000000280)={0x401, 0x81, 0x1, 0x5, 0xfffffffffffffffe, 0x3, 0x10001}, &(0x7f0000000300)={0x5, 0x8000, 0x0, 0x2, 0x2, 0x9, 0x0, 0x3}, &(0x7f00000004c0)={0x6, 0x400, 0x782f, 0x5, 0x9, 0xeb62, 0x8, 0x4}, &(0x7f0000000500)={0x77359400}, &(0x7f0000000580)={&(0x7f0000000540)={0x7}, 0x8}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f00000005c0)=0x401, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000600)) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:42:09 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x0, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspLus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 403.560406] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.566923] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.594023] device bridge0 left promiscuous mode 18:42:09 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$kcm(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x70}, 0x2c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) capget(&(0x7f0000000080)={0x20080522, r2}, &(0x7f0000000100)={0x5, 0x3, 0x2, 0xb1, 0xffffffffffffff3e, 0x5}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) close(r0) 18:42:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x1e1, &(0x7f00000002c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, [], {@ipv6={0x86dd, {0x4, 0x6, "e757c9", 0x1ab, 0x3f, 0x0, @local, @dev={0xfe, 0x80, [], 0x1f}, {[@dstopts={0x1, 0x3, [], [@ra={0x5, 0x2, 0x4}, @ra={0x5, 0x2, 0x63}, @padn={0x1, 0x2, [0x0, 0x0]}, @calipso={0x7, 0x10, {0x8001, 0x2, 0x3, 0x4, [0x15]}}]}, @fragment={0xbf, 0x0, 0x7, 0x1, 0x0, 0x3, 0x68}, @routing={0x73, 0xa, 0x1, 0x6, 0x0, [@loopback, @loopback, @remote, @mcast2, @local]}, @hopopts={0xff, 0x6, [], [@calipso={0x7, 0x20, {0x80, 0x6, 0x40000000, 0x3, [0x9, 0x5, 0x3]}}, @hao={0xc9, 0x10, @mcast1}]}], @tcp={{0x4e24, 0x4e22, r0, r1, 0x1, 0x0, 0x6, 0x10, 0xffffffffa5dcf122, 0x0, 0x6, {[@sack_perm={0x4, 0x2}]}}, {"387607937cfea0425ad56b15c397bde64d0cfe863b3bd915eab078e2458dd1f2373b1472e28c25668fc478eeed59ea3c5b5aa7ba2a257dcc95a072a61b049de39cc3f0e362af7dadba621f2fd72b2480b690d124ce3c86d1e1be53a4a6afdfa944832ea5c6bdc854eea405461a0a1f9428d7422f30f49c72073e85d6da35566a4e782ec525dcdda4649d97d0b3431b950a13d1be0f3958d9ef8f671e7d87db18cac1bce56f8e7652cbbe31124139eaef48d5581a33c5fabd1966f45021653dcd68e8514e62ef9aa2a31742"}}}}}}}, &(0x7f00000000c0)={0x1, 0x4, [0x944, 0x7f0, 0xb49, 0xef8]}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000280)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001cc0)=""/4096, 0x1000}], 0x1, &(0x7f0000000140)=""/26, 0x1a}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000740), 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180), 0x85, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 18:42:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000140)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x8c55a2e076bc4150) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000240)) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x0, 0x2, 0x4, {0xa, 0x4e24, 0x0, @loopback, 0xffffffffffffffff}}}, 0x3a) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000040)={'tunl0\x00', 0x434}) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) syz_open_procfs(r5, &(0x7f0000000200)='net/sco\x00') sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000013, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0), 0xc, &(0x7f0000002980), 0x0, &(0x7f00000029c0)}, 0x0) seccomp(0x0, 0x0, &(0x7f0000028ff0)) [ 404.242941] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.249463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.256249] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.262703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.269873] device bridge0 entered promiscuous mode 18:42:10 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0x0, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 404.289964] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.296577] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.317180] device bridge0 left promiscuous mode 18:42:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x38) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 404.452034] input: syz1 as /devices/virtual/input/input16 [ 404.608060] input: syz1 as /devices/virtual/input/input17 [ 404.641263] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.647840] bridge0: port 2(bridge_slave_1) entered forwarding state 18:42:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 404.654651] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.661113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.668119] device bridge0 entered promiscuous mode 18:42:10 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0xd0, &(0x7f00000004c0)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x100000000, @ipv4={[], [], @rand_addr=0x5}, 0xff}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}, @in6={0xa, 0x4e21, 0xffffffff, @empty, 0xfffffffffffffc00}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x1, @remote, 0x9}, @in6={0xa, 0x4e24, 0x3ac3b06c, @remote, 0x6b}, @in={0x2, 0x4e20, @local}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000005c0)={0x9, 0x200, 0x5, 0x8, r6}, &(0x7f0000000600)=0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:42:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspuus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:10 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x0, 0x1, 'syz0\x00', &(0x7f0000000180), 0x0, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 404.706106] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.714268] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.732004] device bridge0 left promiscuous mode 18:42:10 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x1) ioctl(r0, 0xffffffff, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x1c, &(0x7f0000651000)=""/240, &(0x7f0000000000)=0xffffffffffffff0d) 18:42:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x201000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r1, 0x8922, &(0x7f0000000080)={"73797a5f74756e0000000000ff00", &(0x7f0000000240)=ANY=[]}) r2 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0xe, 0x0) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000003c0)=0x7, 0x2) [ 405.319559] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.326111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.332887] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.339343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.346172] device bridge0 entered promiscuous mode [ 405.354643] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.361154] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:11 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x0, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 405.369874] device bridge0 left promiscuous mode [ 405.628010] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.635180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.644238] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.651453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.658488] device bridge0 entered promiscuous mode [ 405.665282] syz_tun: mtu greater than device maximum [ 405.674220] syz_tun: mtu greater than device maximum 18:42:11 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:11 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/100, 0x64) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f0000000240)) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:42:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp\nus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000002c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 405.702651] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.710971] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.723767] device bridge0 left promiscuous mode 18:42:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000200)=""/68) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0x101, 0x7fffffff}, 'port1\x00', 0x20, 0x100000, 0x10001, 0x7fff, 0x8, 0x3f, 0x0, 0x0, 0x3, 0x6}) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000080)={0x0, 0x81, 0x4, 0x8, &(0x7f0000ffb000/0x2000)=nil, 0x1ff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) fstat(r1, &(0x7f0000000680)) r2 = inotify_init() readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x2a) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x6, 0x6}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000340)={@local, 0x7, 0x2, 0x2, 0xa, 0xffff, 0x6, 0x6}, &(0x7f0000000380)=0x20) [ 406.417005] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.423566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.430322] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.436704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.444150] device bridge0 entered promiscuous mode 18:42:12 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 406.469996] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.476476] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.514978] device bridge0 left promiscuous mode 18:42:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsp/us\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") mknod$loop(&(0x7f0000000080)='./file0\x00', 0x20, 0x0) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001280), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) mkdirat(r1, &(0x7f0000000400)='./file0\x00', 0x8) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='veth0_to_team\x00', 0xfff}) [ 406.830957] gfs2: not a GFS2 filesystem [ 406.903640] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.910091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.916786] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.923212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.930520] device bridge0 entered promiscuous mode 18:42:12 executing program 5: r0 = socket$inet6(0xa, 0x5b03a0273c27cb31, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x2}, 0x28, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:13 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x0, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:13 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)) ioctl(r2, 0x8911, &(0x7f0000000300)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) fstat(r4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000002218a9da1d2"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$sock_SIOCGIFBR(r6, 0x8940, &(0x7f0000000240)=@generic={0x0, 0x1, 0x5}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 406.950578] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.957086] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.989285] device bridge0 left promiscuous mode 18:42:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e617489ebc50115a2d6b5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:13 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) accept4$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x80000) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@dev={0xac, 0x14, 0x14, 0x13}, @in=@local, 0x4e21, 0x0, 0x4e21, 0x1, 0xa, 0x0, 0xa0, 0x3c, r6, r7}, {0x8, 0x18000000000000, 0x3, 0x5f6, 0x5, 0x6, 0x7f, 0x7fffffff}, {0x101, 0x9, 0x4, 0x100000001}, 0xe7d4, 0x0, 0x1, 0x0, 0x3, 0x3}, {{@in6=@local, 0x4d3, 0x6f}, 0xa, @in=@local, 0x3500, 0x3, 0x0, 0x2e3a, 0x5, 0x101, 0x1}}, 0xe8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000680)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000071069c2508eb807987d97bcd8b3bf7108af53603bc0cfeb073668d5b7efd1157af453dbef4ce08f2a5abee31054d8da8394be675b230f38fb439f605e1ae45b5b1c306b0863db07ef9b03d52555900eeca21bb14dbb48154ce234c79c2b275e024110da171a6acca27713a131b37e804a8a7a07244dc12feb91d963c17306819fc21303103fedd7d3b220ed32cea15adb5f4c7c057d387c0db714f2a8ab51b48", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 407.386736] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.393373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.400187] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.406556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.413372] device bridge0 entered promiscuous mode [ 407.425628] bridge0: port 2(bridge_slave_1) entered disabled state 18:42:13 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 407.432197] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.445435] device bridge0 left promiscuous mode 18:42:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspl-s\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 407.537153] gfs2: not a GFS2 filesystem [ 407.838475] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.845502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.852318] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.858673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.865512] device bridge0 entered promiscuous mode 18:42:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) r1 = getpgrp(0x0) wait4(r1, &(0x7f0000000000), 0x80000008, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001dc0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001e00)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e40)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000001f40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000002200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800002}, 0xc, &(0x7f00000021c0)={&(0x7f0000001f80)={0x210, r2, 0xe37, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x128, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5f}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r6}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff5e}}}]}}]}, 0x210}}, 0x4040000) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000003f24)="050000003778d9f1ef73ada4753dd58b4d4b6e689d30d71c32fc0b98143e037dc1250278424e1b0368a82cc15eb4037dc12502000000b5e8", 0x38}], 0x1}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCRMFF(r9, 0x40044581, &(0x7f0000000380)=0x7e) r11 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x200080) syz_kvm_setup_cpu$x86(r10, r11, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000340)=[@text64={0x40, &(0x7f00000002c0)="67d073b50f606a0066ba410066edb93b0900000f3266baf80cb8e023768fef66bafc0c66b8fb4f66ef66660f38f6d9b8010000000f01c1c4832d6ea70000000001410f01710c0f01df", 0x49}], 0x1, 0x8, &(0x7f0000000380), 0x0) 18:42:13 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x0, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 407.885019] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.892551] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:13 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000004c0)={0x0, 0x3ff, 0x1, 'queue1\x00', 0x4ab3}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000240)=@assoc_value, &(0x7f0000000300)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:42:13 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000001c0)=0x8000000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0xfffffffffffffffd, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 407.937854] device bridge0 left promiscuous mode 18:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8, 0x101002) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000001c0)={0x10000000}) r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) 18:42:14 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:14 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f00000004c0)={{0x100, 0x20}, 'port0\x00', 0x3, 0x20000, 0x2, 0x9, 0x101, 0x92b6, 0x3, 0x0, 0x7, 0x8}) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 408.505254] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.511940] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.520507] device bridge0 left promiscuous mode [ 408.784063] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.790630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.797361] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.803825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.830416] device bridge0 entered promiscuous mode 18:42:14 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000), 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:14 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplXs\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000300)={r1, r1, 0x5, 0x101, &(0x7f0000000580)="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", 0x8, 0x5, 0x4, 0x40, 0x101, 0x7, 0xf5, "10f206dd24d8"}) r3 = dup2(r2, r1) r4 = dup(r1) socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x1d61, 0x4, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x9, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000200)={r6, 0x422}, &(0x7f0000000240)=0xfffffffffffffcab) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:15 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:15 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, 'queue0\x00'}) getsockopt$inet6_opts(r5, 0x29, 0x39, &(0x7f0000000540)=""/203, &(0x7f0000000280)=0xcb) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, @mcast2, @ipv4, 0x80000001, 0x5, 0x9, 0x400, 0x1, 0x4040011, r6}) [ 409.095208] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.101820] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.150109] device bridge0 left promiscuous mode 18:42:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0000000fb31a0cd7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 409.723652] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.730239] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.737074] device bridge0 left promiscuous mode 18:42:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="000100000008000081000000c9030000f4200204000000000000000000000009e920000020bdfe0040350ce9943df0256e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="695f76450f0304657273696f008000000000000037e4025436"]) 18:42:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplos\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 410.170018] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.176429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.184048] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.190500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.213418] device bridge0 entered promiscuous mode 18:42:16 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00'}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x8, "7175657565310000000000000000000000000000000000000000000000000000000000000000000000000000000400"}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000200000000000000747b302e5e3d316c1ec5f70272f08047378e563cc7674a21a0da079c83c6fa8c4e424c7bf031872f48ab9949d7ba5b7163e4ac4d559d438339da37df14c61818898eccb7af79a8e5b70a3993acabe6ab14459d47af6382ca06fbfab4ce39c1cf9a3bea0ed4d1116a5bae8fb00cfcdd1af4d6a6b439061202f66b40e7526d6f84", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000300000000000005000000000000000040000000002f389c00000000000000000000000000000000"], @ANYBLOB="00000000000000000000004bd89364000000000000000000000000000000d8b71fd975c92a8a0001"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000000080), 0xffffff17) 18:42:16 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x0, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 410.320156] EXT4-fs (loop2): Unrecognized mount option "i_vEersio" or missing value 18:42:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000001c0)=0x80000001, 0x2) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)=0x5, 0x4) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 410.427086] EXT4-fs (loop2): Unrecognized mount option "i_vEersio" or missing value [ 410.450075] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.456639] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.498889] device bridge0 left promiscuous mode 18:42:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspl+s\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:16 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) mknod(&(0x7f0000000240)='./file0\x00', 0x1040, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) execve(&(0x7f0000000680)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000280)) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) 18:42:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x5, 0x400, 0x0, 0x0, 0x12}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x6}, &(0x7f0000000240)=0x8) sendmsg$rds(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/120, 0x78}, {&(0x7f0000000340)=""/95, 0x5f}], 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="30000000000000001401000003000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='U\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="4c001c9e6d7a1fb779ff41000000000000580000000000001414010000090000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000d60400"], @ANYPTR=&(0x7f0000000dc0)=ANY=[@ANYBLOB="0007000000000000820e4400b2c8e7607d0610ffdcf09340d376090ac29f154266c4f10112e6fdb1bc6d2096b3bf7ee2be7e1b0674a1b4e06a55dba86c4f2958a49e96b03171b384c41b5408c484adc027c53d81ccd4006e50236715a6f7d907"], @ANYBLOB="030000000000000001000000000000008effffffffffffff08000000000000005a00000000000000010000000000000058000000000000001401000008000000ff07000004000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="8e0c000000000000"], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="0500000000000000"], @ANYBLOB="07000000000000000200000000000000feffffffffffffff02000000000000004400000000000000ffff0000000000005800000000000000140100000700000006000000ff000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000"], @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="0100000001000000"], @ANYBLOB="050000000000000001040000000000000000008000000000090000000000000010000000000000000101000000000000480000000000000014010000010000007f00000009000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ed00000000000000", @ANYPTR=&(0x7f0000000b40)=ANY=[@ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f900000000000000", @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe00000000000000", @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0100000000000000", @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="a200000000000000", @ANYPTR=&(0x7f0000000a40)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000360f000000000000000000000000000000000000000000a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="d400000000000000"], @ANYBLOB="050000000000000040000000000000000a0d0000000000001800000000000000140100000c0000000600000000000000"], 0x198, 0x4}, 0x800) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r2, 0x5404, &(0x7f00009d4000)) ioctl$KDGKBLED(r2, 0xc0045405, &(0x7f00000000c0)) ioctl$TCSETS(r2, 0xc0045405, &(0x7f0000000040)) ioctl$LOOP_CLR_FD(r2, 0x4c01) unlink(&(0x7f0000000280)='./file0\x00') 18:42:16 executing program 2: r0 = dup(0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x1000000000000ff, 0xb4, 0x0, 'queue0\x00', 0x4}) r1 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x50, &(0x7f0000000080)=""/8, &(0x7f0000000040)=0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000001180)) [ 411.084009] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.090508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.097227] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.103670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.130470] device bridge0 entered promiscuous mode 18:42:26 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00'}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0b1902ae3a8d06ee6c40a2c39332b745c92ce08db0b91d3157de83d81319fc0c656a9e448141b7c69a08cdbf"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r1, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) 18:42:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) 18:42:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000006c0)={0x200000001ff, 0x81, 0x2}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@remote, 0x4e23, 0x0, 0x4e21, 0x8, 0x2, 0xa0, 0x0, 0x2b, r3, r4}, {0x5, 0x10001, 0x0, 0x7ff, 0xc6c, 0x401, 0x2, 0x72}, {0x7, 0x8, 0x4, 0x7}, 0x5, 0x6e6bb5, 0x2, 0x1, 0x3, 0x3}, {{@in, 0x4d5, 0x3f}, 0xa, @in6=@loopback, 0x34ff, 0x5, 0x1, 0xc1e4000000000000, 0x6000000000000, 0xdd, 0xab1}}, 0xe8) r5 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x8003) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0xc058534f, &(0x7f0000000200)) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:26 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x0, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplxs\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) [ 420.598498] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.606203] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.635623] device bridge0 left promiscuous mode 18:42:26 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00'}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplss\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) write$P9_RVERSION(r1, &(0x7f0000000140)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0xffffffffffffffff, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) [ 421.687417] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.693961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.700713] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.707100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.714544] device bridge0 entered promiscuous mode [ 421.720779] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 18:42:27 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspl*s\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:27 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) sendto$inet(r6, &(0x7f00000004c0)="c9f6c3817ad8b6711d3089262f7997a5febcad3ba87db3ac9117a62b627f608ea5b58e2d9f998085183e6fa27c677841436764531a70f925b9cec0c11964b80fcebf0a38eb9fdbaea5a56e4b2e55e95a32f9f343488f88cdc731fbc9d0c23cd358a6487d2da7cf7983d862b6205079907cb6e3fbec8330ef1647a49a1ffb096106384b993949f455be852d6c4c5adccbb2df74c3aa2d1f650313e919f35159f5a217ad2c31a65ba501a26784bcaf3c35b18efd5b1240c1", 0xb7, 0x4000, &(0x7f0000000240)={0x2, 0x4e22, @rand_addr=0x81}, 0x10) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000300)=0x0) ptrace$setregs(0xd, r7, 0x6, &(0x7f0000000580)="818152842e9876905829a124efd55d7fc14da970d07c7be8266d8ccdb1688fd1f73b22bcd494614b50cca4ab45d548fb02eadfe2ff07538aa44770625a06cfefeebfad4f8f2f0b270100e992a02b58b716c1306fd7bb7989a873466642d1569207f9e5b8d66ecf597fcf269291f8c6102bd92f5a8a94bfb4b44e5038e3e0a12f81bf3b45419c6753134609f87449c44db0c9b7e03cd6dffd3945a3a25757ea5e02bc7f") 18:42:27 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x0, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:28 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00'}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 422.114987] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.121593] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.132838] device bridge0 left promiscuous mode 18:42:28 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x401, 0x840) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000004c0)={0x1, 0x8, 0x4487, 'queue0\x00', 0x8}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x5) r4 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r2, r4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r4, &(0x7f0000000080), 0xffffff17) [ 422.413167] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.419592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.426355] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.432767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.440253] device bridge0 entered promiscuous mode [ 422.445846] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 422.453119] bridge0: port 2(bridge_slave_1) entered blocking state 18:42:28 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 422.459634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.466413] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.472849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.481384] device bridge0 entered promiscuous mode [ 422.487282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 18:42:28 executing program 2: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe40ebc859092b5e, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xde1) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 18:42:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) ftruncate(r2, 0x5a) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplcs\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl(r0, 0x100, &(0x7f0000000600)="66ef395a5da44e2041a1aaf7bdc7510f17d07c40b019288351c6261f510cbc88130b7c698cd718eaa66cee926d15118697f37f2d0419c02c5556fc729c65551e65f2d1ad804bd8421d") r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r1, 0x10}, {r2, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x80080, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x40, r5, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000014}, 0x90) ioctl(r3, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r6 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r8 = dup2(r7, r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r8, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r6, &(0x7f0000000080), 0xffffff17) 18:42:28 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x0, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 422.627947] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.634524] bridge0: port 1(bridge_slave_0) entered disabled state 18:42:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x0) [ 422.785423] device bridge0 left promiscuous mode 18:42:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept4(r0, &(0x7f0000000200)=@ax25, &(0x7f00000002c0)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000001bc0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001b80)={&(0x7f0000000480)=ANY=[@ANYBLOB="dc160000130a000826bd7000fcdbdf2500000009d688b0bef330cd42778f5868a32018dec99b65c0b6d0450bd6680957e57b1872e50172d980c1ec24eba00e0542c79c189bb44cb27e0d9a157a2002036ed831b6991b6d564aedaf16edcafd4799e939aab50f0152f880d90a3cfc3ca178ae3ed0d36410236e399c514732466dda89348a1e6e1550274a56845935335bf193653eb354c85647a38b0367c7bfb738cf3211c62a51e962ad726d1654cc23293743c86615425d00c0b910bb7ba9f4bc3bab4f1b5413c7db2811be84b2965eee6d1a15d8ab10a0d9085309b3fab008004800", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="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"], 0x16dc}}, 0x4000080) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2002, 0x0) accept4$llc(r4, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x10, 0x800) shutdown(r3, 0x0) recvfrom(r3, &(0x7f0000000080)=""/105, 0x69, 0x0, &(0x7f0000000180)=@pppol2tp, 0x70c000) [ 423.110471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 423.124094] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.130676] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.147276] device bridge0 left promiscuous mode [ 423.549664] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.556191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.562973] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.569347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.577380] device bridge0 entered promiscuous mode [ 423.583599] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 423.591040] bridge0: port 2(bridge_slave_1) entered blocking state 18:42:29 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') [ 423.597496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.604224] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.610661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.644458] device bridge0 entered promiscuous mode 18:42:29 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = dup3(r1, r1, 0x80000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000580)={{0x3, 0xf5c04697598582d8, 0x0, 0x2, 'syz1\x00', 0x7c}, 0x3, 0x130, 0x1, r3, 0x6, 0x401, 'syz0\x00', &(0x7f00000004c0)=["2676626f786e657430656d30707070306e6f64657621626465766367726f7570766d6e6574319a6d643573756d5d7d00", '/proc/self/net/pfkey\x00', "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d", 'md5sumselinux\x00', 'loppp1ppp1:mime_type\x00', '/dev/snd/seq\x00'], 0xb5, [], [0xfff, 0x6, 0x6, 0xfffffffffffffc00]}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r5 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r7 = dup2(r6, r5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r7, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000087c0ed1b00"], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r5, &(0x7f0000000080), 0xffffff17) 18:42:29 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0x0, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplls\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) splice(r0, &(0x7f0000000080), r1, &(0x7f00000000c0), 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000002a80)=ANY=[@ANYBLOB="a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c80)={0x0, 0x0}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000002c40)={0x1, r3}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000140)={0x1, "76657468310000008800", 0x4}, 0x18) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) r8 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000004280)={{{@in=@loopback, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002c00)=0xe8) fstat(r0, &(0x7f0000004380)) fstat(r4, &(0x7f0000005900)) getegid() fstat(r6, &(0x7f0000005980)) stat(&(0x7f0000005a00)='./file0\x00', &(0x7f0000005a40)) fstat(r5, &(0x7f0000005ac0)) stat(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)) getgroups(0x6, &(0x7f0000005c00)=[0xee01, 0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee00]) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000061c0)=0xe8) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) syz_open_dev$sndmidi(&(0x7f00000062c0)='/dev/snd/midiC#D#\x00', 0x7fff, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000069c0)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000006ac0)=0xe8) getresgid(&(0x7f0000006b00), &(0x7f0000006b40)=0x0, &(0x7f0000006b80)) stat(&(0x7f0000006e40)='./file0\x00', &(0x7f0000006e80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000006f00), &(0x7f0000006f40)=0x0, &(0x7f0000006f80)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000006fc0)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x9, &(0x7f0000007100)=[0xee01, 0x0, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff]) fstat(r7, &(0x7f0000007140)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() r17 = getuid() lstat(&(0x7f00000071c0)='./file0\x00', &(0x7f0000007200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000007280)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f00000073c0)='./file0\x00', &(0x7f0000007400)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007740)={{{@in=@rand_addr, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000007840)=0xe8) fstat(r6, &(0x7f0000007880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000007900)={0x0, 0x0}, &(0x7f0000007940)=0xc) r22 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000007980)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000007a80)=0xe8) lstat(&(0x7f0000007ac0)='./file0\x00', &(0x7f0000007b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r25 = getuid() r26 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000007b80)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000007c80)=0xe8) getresgid(&(0x7f0000007cc0)=0x0, &(0x7f0000007d00), &(0x7f0000007d40)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000007d80)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007e80)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000007ec0)={0x0, 0x0, 0x0}, &(0x7f0000007f00)=0xc) lstat(&(0x7f0000007f40)='./file0\x00', &(0x7f0000007f80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000008000), &(0x7f0000008040)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000008640)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000008740)=0xe8) r32 = getgid() getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000008780)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000008880)=0xe8) getgid() sendmmsg$unix(r1, &(0x7f0000008940)=[{&(0x7f0000006380)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006640)="fe3d0f62bd692126be038d2d6f3229e7e853346e2403db094080906d1bcf76514e7208d1b7edb2b700b64284e2f74df2942cb4c41b57cb33e1b08a61dc64828ab6ab18c33e1b5d15e044852f855ebe9e404c87ce940c7907278a65d8b6707acfd9ab3ad3e27ef744eac2d470fcdc27464b66ac45b257e3aa688fe9ed436fb9dd7f09c6ac5f49cde9a06204b459412a1657a33d84a6011d6cf22087e8e27811a7139d97d05c8ec78f3832b1f550313684f1856606f2dfdfd1e02a2de790af781af5f3510811ae1fd264351d921ce9eb08f606ca7f047ed97099e462a2bcbd8cf256db5d1ca14a9c22", 0xe8}], 0x1, 0x0, 0x0, 0x800}, {&(0x7f0000006780)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006980)=[{&(0x7f0000006900)="5286003e879955c22ddf1559fafb6b324109a6a1cde8b2dce7b598940ce3eda5a1e206a507b9eb2712816be74ecf624d1d09d1473e06cabf7328a15c6ecf8ff851167a6fae6c6f1fef87ddcc", 0x4c}], 0x1, &(0x7f0000006bc0)=[@cred={0x20, 0x1, 0x2, r2, r9, r10}], 0x20, 0x800}, {&(0x7f0000006c40)=@abs={0x0, 0x0, 0x1}, 0x6e, &(0x7f0000006e00)=[{&(0x7f0000006d80)="30e52e4ec4aaed14f360169296dcb8d22b6cc7d86f39a0db939bacaf03f820129af623c2549803d7710b11e7bf6e0bc1c1e4530a988dab0cf7154d5a4a2a9f55ec04450bb08c67d1d26cf2025e8bea4aaa027809f83ddb3bd529b6da9fbc71fdd958", 0x62}], 0x1, &(0x7f0000007480)=[@cred={0x20, 0x1, 0x2, r8, r11, r12}, @cred={0x20, 0x1, 0x2, r2, r13, r14}, @cred={0x20, 0x1, 0x2, r2, r15, r16}, @cred={0x20, 0x1, 0x2, r8, r17, r18}], 0x80, 0x4}, {&(0x7f0000007540)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000007700)=[{&(0x7f00000076c0)="50a6ddef4fc7d5da8b69b969bd01c92cc9a1441eff1573961e407e5972fadfd48a039a8345edbd370e52", 0x2a}], 0x1, &(0x7f0000008080)=[@cred={0x20, 0x1, 0x2, r8, r19, r20}, @cred={0x20, 0x1, 0x2, r8, r21, r22}, @cred={0x20, 0x1, 0x2, r3, r23, r24}, @rights={0x38, 0x1, 0x1, [r1, r7, r4, r6, r6, r5, r4, r5, r4, r1]}, @rights={0x20, 0x1, 0x1, [r5, r5, r1]}, @rights={0x20, 0x1, 0x1, [r7, r0, r0, r4]}, @cred={0x20, 0x1, 0x2, r3, r25, r26}, @cred={0x20, 0x1, 0x2, r8, r27, r28}, @cred={0x20, 0x1, 0x2, r3, r29, r30}], 0x138}, {&(0x7f0000008200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000085c0)=[{&(0x7f0000008580)="8d51", 0x2}], 0x1, &(0x7f00000088c0)=[@cred={0x20, 0x1, 0x2, r2, r31, r32}, @rights={0x18, 0x1, 0x1, [r7]}], 0x38}], 0x5, 0x4) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000002cc0)={0x830a, 0x3, 0x6fff8, 0x4, 0x82d, 0x6e371b8c}) process_vm_readv(r8, &(0x7f0000000280)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/51, 0x33}], 0x3, &(0x7f00000026c0)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/232, 0xe8}, {&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000002480)=""/27, 0x1b}, {&(0x7f00000024c0)=""/35, 0x23}, {&(0x7f0000002500)=""/125, 0x7d}, {&(0x7f0000002580)=""/170, 0xaa}, {&(0x7f0000002640)=""/95, 0x5f}], 0x8, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000002bc0)={0x2, 'bond_slave_1\x00', 0x2}, 0x18) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) r33 = add_key$user(&(0x7f0000002780)='user\x00', &(0x7f00000027c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000002800)="1632e37280209fe726b47057bd88d4e1c06b95e071bb3827159d0b3b1cbba1295611d0796ab731eb61b49c9c9f8457cd5fe7ab4d08ad7fa873a3c5a849739b8a1c7e4f2c045f75059422f84db01d5a8e164923bd086591a7d8d0eddf64428d9beae84c1857e278db0b3eb0592deb84dfa62f1fa29e5550b3b743b9f51e7f13215abe27f76c736ec6756ee84a608f706281a4ecef5a3658b97813052f4dfe8d79bd91e02985e69d04dabaad07c31e5ea6a83cec7c144f10a31a6f25623ee91bcf771c1e255d0956124010485bb709f645060f6f02b6651e312e1f591e0224f52a5a36cb5ce7e3313efd9a6032d90221716c5bb8305e6f31", 0xf7, 0x0) keyctl$get_security(0x11, r33, &(0x7f0000002900)=""/213, 0xd5) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000002a00)={{0xa, 0x4e21, 0x1, @mcast2, 0xffffffffffffd8b6}, {0xa, 0x4e24, 0xffff, @mcast1, 0x101}, 0x0, [0x6, 0x3ff, 0xfffffffffffffffa, 0x6, 0x0, 0x33d, 0x9, 0x3f]}, 0x5c) [ 423.816389] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.822980] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.875186] device bridge0 left promiscuous mode [ 424.137004] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1, syncid = 4, id = 0 [ 424.140250] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.152152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.160391] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.167253] bridge0: port 1(bridge_slave_0) entered forwarding state 18:42:30 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f62d997c934c046b8f6") r2 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r4 = dup2(r3, r2) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000280)={0x3, 0x3, 0x3}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000300)=0x5, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r2, &(0x7f0000000080), 0xffffff17) [ 424.186702] device bridge0 entered promiscuous mode [ 424.212199] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 424.234330] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.240919] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.260552] device bridge0 left promiscuous mode [ 424.562270] IPVS: sync thread started: state = BACKUP, mcast_ifn = bond_slave_1, syncid = 2, id = 0 [ 424.573237] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.580381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.589070] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.596157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.610154] device bridge0 entered promiscuous mode [ 424.617373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:42:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:35 executing program 1: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r5, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x5, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r8}, 0x14) ioctl$TIOCSLCKTRMIOS(r7, 0x5457, &(0x7f0000000000)) syz_open_pts(r2, 0x4000) r9 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:35 executing program 0: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000003c0)=0x0) syz_open_procfs(r0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0xa) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00', 0x4}, 0x1, 0x200, 0xcb7d, r6, 0x1, 0x1, 'syz0\x00', &(0x7f0000000180)=["2984657468302e6367726f75706500"], 0xf, [], [0x80000001, 0x0, 0x8, 0x401]}) bind$bt_sco(r1, &(0x7f0000000380)={0x1f, {0x8, 0x8, 0xfffffffffffffffa, 0x0, 0x0, 0x2745be1}}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\x00', 0xfffffffffffffffd}) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) r8 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e21, 0x40, 0x0, 0x80, 0x80, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100, 0x9}, {0x7, 0x7, 0x7, 0xf68}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x2, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0xc723, 0x3, 0x20}}, 0xe8) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000880)="d704017ae45a4b4aad8e7692daacdd71ea1051e2a20355e1581119a21b79e7df627bd147d135770e2c7584fda53c8b6bfd34a32ce52b184e34e950147f892cdc", 0x40, 0xfffffffffffffffa) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @loopback}, &(0x7f0000000340)=0xfffffffffffffc5a) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000003ac0)={@local, r9}, 0x14) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f0000000000)) syz_open_pts(r3, 0x4000) r10 = add_key(&(0x7f00000004c0)='blacklist\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r10, &(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000580)='+/cgroupvmnet1%%keyring\x00') 18:42:35 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x10001}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) openat$cgroup_procs(r1, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x400) clock_gettime(0x0, &(0x7f0000000ac0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000bc0)=""/153) openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x7fffe, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000500)={{0x0, 0xaf}, {0x7fffffff, 0x2}, 0x4, 0x0, 0x157c}) clock_gettime(0x200000000000009, &(0x7f0000000480)) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={[], 0xfffffffffffffffd, 0x106, 0x279d}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/mixer\x00', 0x0, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x0) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x9, 0x200) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000300)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 18:42:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfspl.s\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)={[{@creator={'creator', 0x3d, '\vH\x00@'}}]}) 18:42:35 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r0, 0x10}, {r1, 0x2000}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f62d997c934c046b8f6") r3 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r5 = dup2(r4, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000052b8cf0b1ace1df2000700000000000000000000000000000000004000400000000000000000000000000000020000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f00000004c0)=""/190) write$sndseq(r3, &(0x7f0000000080), 0xffffff17) [ 429.119047] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.126213] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.150645] device bridge0 left promiscuous mode 18:42:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000040)="000276d43857a72667ae19eae24522680b00000000000000000000", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x101801) r3 = dup2(r2, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2c801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ef17a8c5ae95ec86760de884e9740474a13eea165c0322901dc6bd36cde2c51d41b7f0b014f9f91eeb7c37c7340f476c8d753d000aa8faf8fb574dbcda6dc4d", 0x582}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x7, 0x7, 0x0, 'queue1\x00', 0x1}) write$sndseq(r1, &(0x7f0000000080), 0xffffff17) 18:42:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) 18:42:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000580)=0x19fc, 0x4) sendto$inet(r0, &(0x7f00000000c0)="b0", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200)='{', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 18:42:35 executing program 2: prctl$intptr(0x1d, 0xfffffffffffff3cf) prctl$intptr(0x1e, 0x0) 18:42:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000006400)=ANY=[@ANYBLOB="1c0000000301ffff0000000000000121029ebe442778000800080004"], 0x1c}}, 0x0) [ 429.707105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 429.718886] kasan: CONFIG_KASAN_INLINE enabled [ 429.724057] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 429.731663] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 429.737926] CPU: 0 PID: 16941 Comm: syz-executor2 Not tainted 4.19.0-rc4-next-20180921+ #77 [ 429.746422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.755806] RIP: 0010:ctnetlink_alloc_filter+0xb9/0x200 [ 429.761184] Code: 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 40 49 8d 7d 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 06 [ 429.780104] RSP: 0018:ffff88018e9771a0 EFLAGS: 00010247 [ 429.785480] RAX: dffffc0000000000 RBX: ffff8801c9d7c200 RCX: ffffc90003e5e000 [ 429.792756] RDX: 0000000000000000 RSI: ffffffff864e6f4d RDI: 0000000000000004 [ 429.800036] RBP: ffff88018e9771b8 R08: ffff88018e57c0c0 R09: ffffed003b585b57 [ 429.807308] R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff88018e977500 [ 429.814586] R13: 0000000000000000 R14: ffff8801d36b58b8 R15: ffff8801d36b5891 [ 429.821868] FS: 00007ff33fe11700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 429.830111] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 429.836010] CR2: 00007fc94acee000 CR3: 00000001cdcd1000 CR4: 00000000001406f0 [ 429.843301] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 429.850591] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 429.857891] Call Trace: [ 429.860503] ctnetlink_start+0x10b/0x1b0 [ 429.864578] __netlink_dump_start+0x43e/0x6f0 [ 429.869079] ? ctnetlink_alloc_filter+0x200/0x200 [ 429.873932] ctnetlink_get_conntrack+0x777/0x9f0 [ 429.878698] ? ctnetlink_exp_stat_cpu_dump+0x9d0/0x9d0 [ 429.883982] ? nfnetlink_rcv_msg+0xa9a/0x10c0 [ 429.888486] ? lock_downgrade+0x900/0x900 [ 429.892635] ? ctnetlink_alloc_filter+0x200/0x200 [ 429.897481] ? ctnetlink_dump_dying+0x30/0x30 [ 429.901981] ? ctnetlink_done_list+0x90/0x90 [ 429.906393] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 429.911333] ? __lock_is_held+0xb5/0x140 [ 429.915403] ? ctnetlink_exp_stat_cpu_dump+0x9d0/0x9d0 [ 429.920688] nfnetlink_rcv_msg+0xdd3/0x10c0 [ 429.925022] ? nfnetlink_bind+0x3b0/0x3b0 [ 429.929179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.934725] ? refcount_sub_and_test_checked+0x203/0x310 [ 429.940188] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 429.945653] ? rcu_softirq_qs+0x20/0x20 [ 429.949630] ? apparmor_cred_transfer+0x590/0x590 [ 429.954483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.960028] netlink_rcv_skb+0x172/0x440 [ 429.964098] ? nfnetlink_bind+0x3b0/0x3b0 [ 429.968263] ? netlink_ack+0xb80/0xb80 [ 429.972159] ? __netlink_ns_capable+0x100/0x130 [ 429.976835] nfnetlink_rcv+0x1c0/0x4d0 [ 429.980727] ? nfnetlink_rcv_batch+0x19b0/0x19b0 [ 429.985487] ? kasan_check_write+0x14/0x20 [ 429.989728] netlink_unicast+0x5a5/0x760 [ 429.993802] ? netlink_attachskb+0x9a0/0x9a0 [ 429.998220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.003770] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 430.008791] netlink_sendmsg+0xa18/0xfc0 [ 430.012859] ? netlink_unicast+0x760/0x760 [ 430.017097] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 430.022029] ? apparmor_socket_sendmsg+0x29/0x30 [ 430.026793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.032338] ? security_socket_sendmsg+0x94/0xc0 [ 430.037099] ? netlink_unicast+0x760/0x760 [ 430.041341] sock_sendmsg+0xd5/0x120 [ 430.045058] ___sys_sendmsg+0x7fd/0x930 [ 430.049044] ? copy_msghdr_from_user+0x580/0x580 [ 430.053798] ? __fd_install+0x2b5/0x8f0 [ 430.057777] ? check_preemption_disabled+0x48/0x200 [ 430.062798] ? __fget_light+0x2e9/0x430 [ 430.066775] ? fget_raw+0x20/0x20 [ 430.070242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.075782] ? __fd_install+0x2f9/0x8f0 [ 430.079762] ? get_unused_fd_flags+0x1a0/0x1a0 [ 430.084356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 430.089895] ? sockfd_lookup_light+0xc5/0x160 [ 430.094406] __sys_sendmsg+0x11d/0x280 [ 430.098307] ? __ia32_sys_shutdown+0x80/0x80 [ 430.102723] ? __x64_sys_futex+0x47f/0x6a0 [ 430.106961] ? do_syscall_64+0x9a/0x820 [ 430.110942] ? do_syscall_64+0x9a/0x820 [ 430.114935] ? trace_hardirqs_off_caller+0x300/0x300 [ 430.120042] ? ksys_ioctl+0x81/0xd0 [ 430.123678] __x64_sys_sendmsg+0x78/0xb0 [ 430.127743] do_syscall_64+0x1b9/0x820 [ 430.131636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 430.137001] ? syscall_return_slowpath+0x5e0/0x5e0 [ 430.141942] ? trace_hardirqs_off+0x310/0x310 [ 430.146441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 430.151459] ? recalc_sigpending_tsk+0x180/0x180 [ 430.156216] ? kasan_check_write+0x14/0x20 [ 430.160464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.165317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.170508] RIP: 0033:0x457679 [ 430.173703] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.193069] RSP: 002b:00007ff33fe10c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 430.200782] RAX: ffffffffffffffda RBX: 00007ff33fe116d4 RCX: 0000000000457679 [ 430.208051] RDX: 0000000000000000 RSI: 0000000020d65000 RDI: 0000000000000003 [ 430.215320] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 430.222586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 430.229857] R13: 00000000004d5520 R14: 00000000004c38d2 R15: 0000000000000000 [ 430.237131] Modules linked in: [ 430.250387] ---[ end trace 023c1c382cba2f2c ]--- [ 430.255269] RIP: 0010:ctnetlink_alloc_filter+0xb9/0x200 [ 430.269807] Code: 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 40 49 8d 7d 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 06 [ 430.307222] RSP: 0018:ffff88018e9771a0 EFLAGS: 00010247 [ 430.318689] RAX: dffffc0000000000 RBX: ffff8801c9d7c200 RCX: ffffc90003e5e000 [ 430.334235] RDX: 0000000000000000 RSI: ffffffff864e6f4d RDI: 0000000000000004 [ 430.341760] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.342057] RBP: ffff88018e9771b8 R08: ffff88018e57c0c0 R09: ffffed003b585b57 [ 430.348240] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.356062] R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffff88018e977500 [ 430.369539] R13: 0000000000000000 R14: ffff8801d36b58b8 R15: ffff8801d36b5891 [ 430.373312] device bridge0 left promiscuous mode [ 430.377651] FS: 00007ff33fe11700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 430.390310] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.396308] CR2: 00007f1297efedb8 CR3: 00000001cdcd1000 CR4: 00000000001406e0 [ 430.404096] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 430.411792] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 430.419189] Kernel panic - not syncing: Fatal exception [ 430.425564] Kernel Offset: disabled [ 430.429190] Rebooting in 86400 seconds..