0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0xffffffffffffffc1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r1, 0x4}, &(0x7f0000000300)=0x8) connect(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x402000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r2, 0x304, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0x1f, 0x6, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) getsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000180)={0x3, &(0x7f0000000080)=[{0x80000000, 0x2, 0x1, 0x4}, {0x5, 0x5b, 0x5, 0x7f}, {0x5, 0x0, 0xaf, 0x1}]}, 0x10) 09:23:38 executing program 3: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f00000a507c72e253a32a60493fb2000202fffffd3b54c007110000f30501000b000600040423ca3100007e2b76921fa6e0cc47c9f7495681000010ea6af9a9843879d228b85c280656015ba7a2968fdc352d607411073b102c47cde646af8e21b719302595b38964260434d04ec5a3a597501fa315611ec0b4a8c6c3ba2acaea3dd5aad1498b3edd355db5e339c17bc41ab1239c0f4f41547ef395fdbb008f6afd12ea340382bd3f7c996d3f2681e997e3b876dca227657692e693b2", 0x19e) 09:23:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d4}, 0x28) [ 594.759646] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.783177] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.789623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 594.821424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 594.989758] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.996931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:39 executing program 3: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) socket(0xa, 0x800, 0x1) 09:23:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x33000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 595.193374] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0H?', 0x2000000c0ffffff}) 09:23:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d5}, 0x28) 09:23:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3a000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 595.347432] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.354052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.382531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.395339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d6}, 0x28) 09:23:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c1000001}) 09:23:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 09:23:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3c000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 595.634446] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.661355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04', 0x202}) 09:23:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d7}, 0x28) 09:23:39 executing program 3: r0 = accept(0xffffffffffffff9c, &(0x7f0000006840)=@generic, &(0x7f00000068c0)=0x80) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000200), &(0x7f00000002c0)=0xc) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000000)='$lobdev/\x00', 0x9) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) r2 = socket$packet(0x11, 0x20000000000000a, 0x300) r3 = socket$inet6(0xa, 0xf, 0x81) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x3ff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000480)={r4, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1, 0x80000000}, &(0x7f0000000380)=0x90) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) recvmsg(r2, &(0x7f0000000440)={&(0x7f0000000180)=@can={0x1d, 0x0}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000400)=""/50, 0x32}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f00000000c0), &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r5}, 0x48) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@dev, @loopback, @dev}, &(0x7f00000000c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='rose0\x00'}) 09:23:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0L?', 0x2000000c0ffffff}) 09:23:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 09:23:39 executing program 0: r0 = socket$inet(0x2, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000005c0)={0x0, 0x5a2}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000640)=@assoc_id=r1, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x40000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 596.158480] device bridge_slave_0 entered promiscuous mode [ 596.196232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d8}, 0x28) [ 596.204225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.228163] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.234579] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x04?', 0x2000000c0ffffff}) 09:23:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x43050000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 596.394868] net_ratelimit: 10 callbacks suppressed [ 596.394877] protocol 88fb is buggy, dev hsr_slave_0 [ 596.404949] protocol 88fb is buggy, dev hsr_slave_1 [ 596.484746] protocol 88fb is buggy, dev hsr_slave_0 [ 596.489828] protocol 88fb is buggy, dev hsr_slave_1 [ 596.494982] protocol 88fb is buggy, dev hsr_slave_0 [ 596.500073] protocol 88fb is buggy, dev hsr_slave_1 [ 596.512309] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.523330] device bridge_slave_0 left promiscuous mode 09:23:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0`?', 0x2000000c0ffffff}) 09:23:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 09:23:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x400}) 09:23:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6c000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4d9}, 0x28) [ 596.564749] protocol 88fb is buggy, dev hsr_slave_0 [ 596.569864] protocol 88fb is buggy, dev hsr_slave_1 09:23:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x80040200, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4da}, 0x28) 09:23:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 09:23:40 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x3a, &(0x7f00000000c0)="da8bd5d7d1f82cfc1f11d3b445c446fdb149edefc37c5e49138b8b9dc533933da0769f17cd08aa1a59dbbb5c0c62d2d06a3eb69040f11e2515528e8087a9ff0aa43f97de1ad3bba51efa3156006f5069bbed69be0603f712b38b701b29b4b4e7b2120efc692106e30693b4639fff12d4992dc30ff3407679a10fd724c3de969bd700", 0x82) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0h?', 0x2000000c0ffffff}) 09:23:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4c3}, 0x28) 09:23:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800e0000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 09:23:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4db}, 0x28) [ 597.163814] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.170298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.203134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getuid() r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x7f, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 597.212456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x80350000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:41 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@x25, &(0x7f0000000040)=0x80) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 'fo\x00', 0x0, 0x4, 0x36}, 0x2c) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 597.461181] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.468695] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.475232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.482074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.490014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.499038] device bridge_slave_0 entered promiscuous mode 09:23:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4dc}, 0x28) 09:23:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x81000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:41 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@x25, &(0x7f0000000040)=0x80) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 'fo\x00', 0x0, 0x4, 0x36}, 0x2c) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 597.516417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7f00200000020000001000000c0081e49674e413c70c7405956eff33d3a843125e4caab071ddb22f2dbfb83392c0f175a63b665136f119b609a09d5233e9ef37326f908cbf99b621ae09cf33e3020202a6000000000000000000000000"]}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) 09:23:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0l?', 0x2000000c0ffffff}) 09:23:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4(r0, 0x0, &(0x7f0000000180), 0x800) recvfrom$netrom(r1, &(0x7f00000001c0)=""/25, 0x19, 0x40000000, &(0x7f0000000200)={{0x3, @null, 0x1}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @bcast, @bcast, @bcast, @bcast]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r2 = accept(r0, &(0x7f00000006c0)=@sco, &(0x7f0000000740)=0x80) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000780), 0x4) 09:23:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x84ffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 597.844737] protocol 88fb is buggy, dev hsr_slave_0 [ 597.849985] protocol 88fb is buggy, dev hsr_slave_1 09:23:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4dd}, 0x28) [ 597.886196] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.897107] device bridge_slave_0 left promiscuous mode 09:23:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x499}, 0x28) 09:23:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x86ddffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 598.309961] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.317800] device bridge_slave_0 entered promiscuous mode 09:23:42 executing program 1: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca3100f0", 0x1f) 09:23:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4de}, 0x28) 09:23:42 executing program 3: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 09:23:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0t?', 0x2000000c0ffffff}) 09:23:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_1\x00', 0x2000000c0ffffff}) 09:23:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) getsockname(r0, &(0x7f0000000640)=@can={0x1d, 0x0}, &(0x7f00000006c0)=0x80) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000700)={0x0, @broadcast}, &(0x7f0000000740)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000780)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) getpeername$packet(r1, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000940)={'hwsim0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a40)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000e40)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000f80)={'dummy0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000fc0)={@initdev, 0x0}, &(0x7f0000001000)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001040)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001080)={'ip_vti0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000011c0)={'yam0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000001440)=0xe8) accept$packet(r0, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000014c0)=0x14) recvmsg$kcm(r1, &(0x7f0000002640)={&(0x7f0000001500)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002600)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/121, 0x79}], 0x2}, 0x2002) accept$packet(r0, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000026c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000002700)={@loopback, @rand_addr, 0x0}, &(0x7f0000002740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002780)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002880)=0xe8) recvmsg(r0, &(0x7f0000003dc0)={&(0x7f0000002900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002980)=""/35, 0x23}, {&(0x7f00000029c0)=""/170, 0xaa}, {&(0x7f0000002a80)=""/9, 0x9}, {&(0x7f0000002ac0)=""/184, 0xb8}, {&(0x7f0000002b80)=""/234, 0xea}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/24, 0x18}], 0x7, &(0x7f0000003d40)=""/112, 0x70}, 0x10020) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003e00)={'bond_slave_1\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000003e40)={@loopback, @dev, 0x0}, &(0x7f0000003e80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003ec0)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200018}, 0xc, &(0x7f0000004d00)={&(0x7f0000004000)={0xcd0, r2, 0x412, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x16c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r6}, {0x17c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xf8e4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x2, 0x8, 0x7c, 0x4}, {0x100000000, 0xcfa, 0x2, 0x15}, {0x800, 0x100, 0x6, 0x400}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}]}}, {{0x8, 0x1, r9}, {0x124, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f80000000}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r11}, {0x178, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9ba}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x21c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r16}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x80000000, 0x3, 0x2, 0x6}, {0x7, 0x7, 0x1, 0x1}, {0x6, 0xdb, 0x7, 0xb41}, {0x65, 0x82, 0x7fff, 0xfff}, {0xa8, 0x800, 0x6, 0x4}, {0x401, 0x9, 0x7, 0x5}, {0x3800, 0x3, 0x9, 0x3}, {0x8000, 0x4, 0x9, 0x5}, {0x400, 0x7, 0x401, 0x7}, {0x9, 0x9, 0x9}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r18}, {0x1b0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xea}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x76a}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffebe8dfe2}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0xb0, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x8, 0x40, 0x0, 0x9}, {0x9, 0x8000, 0xff, 0x6c852c57}, {0x6, 0x4, 0x1ff, 0xd10}, {0xfffffffffffff800, 0x4, 0xbd81, 0x3}, {0x7fffffff, 0x7, 0x90d9, 0x2}, {0x100, 0x3, 0x401, 0x80}, {0x3ffc0000000, 0x8, 0xfffffffffffffffe, 0xfffffffffffffffd}, {0x0, 0xdc, 0x8, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r25}, {0x19c, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x6, 0x9, 0x8, 0x8}, {0x80000000, 0xff, 0xffffffffffffffff, 0xfd}, {0x4, 0x800, 0xca2, 0x5}, {0x2, 0x0, 0x800, 0xe31c}, {0x9, 0x800, 0x6, 0x2}, {0x7fff, 0x5, 0x10001, 0x1000}, {0x7e38a0b5, 0x7f6, 0x9, 0xffff}, {0x0, 0x9, 0x8, 0x2}, {0x5, 0x3c327eb0, 0x356}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfddc}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x400, 0x5, 0x100000001, 0x6}, {0x1000, 0x9, 0x8000, 0xfffffffffffffffc}, {0xfffffffffffffff9, 0x0, 0xffff, 0x1}, {0x8000, 0x5, 0xca, 0x10001}, {0x1, 0x5b, 0x2, 0x9}, {0x1, 0x72, 0x3f, 0x2}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xd8, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x10001, 0x5, 0x6, 0xffffffffffffff7f}, {0x4, 0xc000000000000000, 0x2, 0x2}, {0x2, 0x866, 0x0, 0x8}, {0xa2b8, 0x10000, 0x4, 0x77}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xf9d}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r29}}, {0x8}}}]}}]}, 0xcd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000000c0)={@mcast2, 0x0}, &(0x7f0000000100)=0x14) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, r30, 0x3}, 0xc) r31 = socket(0x10, 0xb, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$PPPIOCSFLAGS(r31, 0x40047459, &(0x7f0000000180)=0x40) ioctl$FS_IOC_GETFLAGS(r31, 0x80086601, &(0x7f0000000000)) 09:23:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88470000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x484}, 0x28) 09:23:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4df}, 0x28) [ 598.599936] device team_slave_1 entered promiscuous mode 09:23:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x71, "b28fe3e26592b7ef4b13f8a0801dd5374d277f64343860ca332f34d9a3b5394dede6d156fa31ebf2f533bf5c7706430bc2ee5505fe0498e1b851a79cd4d8fc6cccf5ed24990ad87f8475e589f0541fdf2b054ec5cd6e5e5860b723ffe0f70dd9d62e9fa67ee08f899b92d76faee785c382"}, &(0x7f0000000240)=0x79) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e21, @rand_addr=0x200}}}, 0x84) ioctl(r0, 0x35f000, &(0x7f00000000c0)="256cd9700104debbe69912d6262dc8b2c9b404388c241a0684a42e7482d559d0a13bf2635256924347bd505ce4a837cfcb1967720100000001000000d2f475a66836743801b4f6517fe73d1ec540d5e69c929876b8cab61adc0739fa7316a05eb45e733bafe106314160d68cfec28f08efc0318bc009fbdd150738c2c826630e7286da4380c6eef995ab24b2bba141354876519ec22591f0e55f14400f296424a22ee93ea506195a4ab56a4ae0f7d8f922e1c6740e9a8b0723ee0518ae439f39b762ad99c415550cf6c3f39ebf7405a18eabcd338ebe0a2bc387c9e9ff0032091ad3640899700508") [ 598.842779] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e0}, 0x28) 09:23:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88480000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x8, 0x7, 0x74}, 0x10) [ 598.970183] device bridge_slave_0 left promiscuous mode 09:23:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0z?', 0x2000000c0ffffff}) 09:23:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x20) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xe0548258a78032a8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0xb00, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8001}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 599.285418] device bridge_slave_0 entered promiscuous mode 09:23:43 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xcf, &(0x7f00000000c0)=""/167, &(0x7f0000000000)=0xa7) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 599.449948] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.459374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.466821] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.473194] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88640000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e1}, 0x28) 09:23:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x47a}, 0x28) 09:23:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'brid\x8b_\xe3Vlave_\xd1\x00?', 0x4000}) [ 599.707598] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.715009] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.721435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.728524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.736680] device bridge_slave_0 left promiscuous mode 09:23:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e2}, 0x28) [ 599.969365] device bridge_slave_0 entered promiscuous mode [ 599.977125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88a8ffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:43 executing program 1: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca31000a", 0x1f) 09:23:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00F', 0x2000000c0ffffff}) 09:23:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r1 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000000)="98d6a5be5559b70b22dc28aa911c4a71fe9f8cba93ad415e6b66e9c4fe9559c95e565b5ee41a5d01b68479cd8edb56b3656e8e7149d2c31453a2985564ecfc6323106e319e9499f1e34930962d3ec8230937b578683d7574e56089", 0x5b) 09:23:44 executing program 1: r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca31f000", 0x1f) 09:23:44 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x0, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 600.368908] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.385807] device bridge_slave_0 left promiscuous mode [ 600.586060] device bridge_slave_0 entered promiscuous mode 09:23:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', 0x2008000c0ffffff}) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x1c, 0x800) setsockopt$inet6_tcp_int(r1, 0x6, 0x1ef6709a8242fc82, &(0x7f00000002c0)=0x228, 0x4) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x3a1, 0x2) socketpair(0x6aaa11e2e147a867, 0x800, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r3, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/233, 0xe9}, {&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000000440)=""/124, 0x7c}], 0x3, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7312}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004) 09:23:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e3}, 0x28) 09:23:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88caffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 600.755677] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.765525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 600.773291] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.779702] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e2}, 0x28) 09:23:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x5, 0x5) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x5f, "c957b24abcc93b841f66c0cfa921a4571e8a2d28397ea1d83b04f228486b508e4234c9ea9ac94b6b2006b19d178a9fdd44e69021e43d9b1c5a6bcaad0200a637ba0074792c94c1b4aefcc11617cc73f27088961b18ba6f55ebd4fbac016572"}, &(0x7f00000001c0)=0x67) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x8, 0x30}, &(0x7f0000000240)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000040)=0x1, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00H', 0x2000000c0ffffff}) [ 601.116876] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.124982] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.131339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.139565] device bridge_slave_0 left promiscuous mode 09:23:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_ifreq(r0, 0x897b, &(0x7f0000000000)={'syz_tun\x00', @ifru_mtu=0x3}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x8, 0xa5, &(0x7f00000000c0)="01d3a38c97f35fb621254f99c05faadc620bc1572f9012589b72be1a5a8aa2eff690f89698036b83f0eea7d8a61e85af78131df9d93d1ffbe2e2d1659b96e33c36cc925221e5e12d9eb6440bccc39b2260c9656ad4dcfa8c33af3abd2986120677fc2299117c46ed1244777e1563159bc16531e57fb927dd89ca36aad680bffda904e4aab58a3f2cc1947871fe2231aa942d6095537d01cd776597374aca830863a905ace6", 0x1, 0x7fff, 0xd7b, 0x2, 0x81, 0x2, 0x0, 'syz1\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 601.385672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.393018] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.399431] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e4}, 0x28) 09:23:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88ffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 601.655261] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.663257] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.669687] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 601.866335] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.874014] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.880506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.887563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.896468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.907834] device bridge_slave_0 entered promiscuous mode 09:23:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:45 executing program 0: r0 = socket$packet(0x11, 0x4, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0x200000000000}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @remote, @remote}, &(0x7f0000000580)=0xc) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x7f, {0x2, 0x9, 0x2, 0x1, 0x9, 0x8}, 0x3, 0x4}, 0xe) sendmsg$can_raw(r1, &(0x7f0000000680)={&(0x7f00000005c0)={0x1d, r2}, 0x10, &(0x7f0000000640)={&(0x7f0000000600)=@can={{0x1, 0x0, 0xcae2, 0x10000}, 0x3, 0x2, 0x0, 0x0, "0c7a8e252c0d24a8"}, 0x10}, 0x1, 0x0, 0x0, 0x48041}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'b0\x04\x00', 0x3002}) [ 601.994731] net_ratelimit: 12 callbacks suppressed [ 601.994739] protocol 88fb is buggy, dev hsr_slave_0 [ 602.004806] protocol 88fb is buggy, dev hsr_slave_1 09:23:46 executing program 0: r0 = socket(0x2, 0x5, 0x3d41) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x9, 0x20}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x1ff}, &(0x7f0000000180)=0x8) r2 = socket$packet(0x11, 0x3, 0x300) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x80000) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0x5, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team_slave_0\x00', 0x40000002000800}) sendmmsg(r2, &(0x7f0000002700)=[{{&(0x7f00000001c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="97dfba4376e56134cd8172c797198d63907b574fdec625e9614cf5902118a8edaac3537d1702a80c6cf8c538e6b2bfa29200fc5900831a431c830779e5bdfc0dbb2792b4e3079ba0a1ec28852e7aa743c80d64099319db19e21607da931b65167a5992134f87d4ba368fd8e0cb100119b7ab13e768f5b15e3c48", 0x7a}], 0x1, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x2388}, 0x1e6}], 0x1, 0x0) 09:23:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e5}, 0x28) [ 602.247512] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.259538] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.265918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.274292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 602.289529] device bridge_slave_0 left promiscuous mode 09:23:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00F', 0x2000000c0ffffff}) 09:23:46 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:46 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 602.634746] protocol 88fb is buggy, dev hsr_slave_0 [ 602.639967] protocol 88fb is buggy, dev hsr_slave_1 [ 602.714749] protocol 88fb is buggy, dev hsr_slave_0 [ 602.720070] protocol 88fb is buggy, dev hsr_slave_1 [ 602.725277] protocol 88fb is buggy, dev hsr_slave_0 [ 602.730344] protocol 88fb is buggy, dev hsr_slave_1 09:23:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x89060000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 602.760615] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.794746] protocol 88fb is buggy, dev hsr_slave_0 [ 602.799848] protocol 88fb is buggy, dev hsr_slave_1 [ 603.015968] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.024227] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.030713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.042067] device bridge_slave_0 entered promiscuous mode [ 603.048246] FAULT_INJECTION: forcing a failure. [ 603.048246] name failslab, interval 1, probability 0, space 0, times 0 [ 603.059571] CPU: 0 PID: 7634 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #69 [ 603.066770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.076118] Call Trace: [ 603.078695] dump_stack+0x172/0x1f0 [ 603.082322] should_fail.cold+0xa/0x1b [ 603.086215] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 603.091333] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 603.096698] ? find_held_lock+0x35/0x130 [ 603.100749] __should_failslab+0x121/0x190 [ 603.104979] should_failslab+0x9/0x14 [ 603.108789] kmem_cache_alloc_node+0x56/0x710 [ 603.113327] __alloc_skb+0xd5/0x5e0 [ 603.116955] ? skb_scrub_packet+0x440/0x440 [ 603.121264] ? if_nlmsg_size+0x4b8/0xa00 [ 603.125312] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 603.129899] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 603.134670] rtmsg_ifinfo+0x8d/0xa0 [ 603.138289] __dev_notify_flags+0x235/0x2c0 [ 603.142596] ? dev_change_name+0xa20/0xa20 [ 603.146822] ? __dev_change_flags+0x513/0x6e0 [ 603.151325] ? dev_set_allmulti+0x30/0x30 [ 603.155477] ? __lock_is_held+0xb6/0x140 [ 603.159525] dev_change_flags+0x10d/0x170 [ 603.163674] devinet_ioctl+0x1396/0x1c60 [ 603.167736] ? _copy_from_user+0xdd/0x150 [ 603.171884] inet_ioctl+0x1fc/0x370 [ 603.175525] ? __lock_acquire+0x53b/0x4700 [ 603.179743] ? inet_stream_connect+0xa0/0xa0 [ 603.184162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 603.189713] ? mark_held_locks+0x100/0x100 [ 603.193954] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 603.198979] ? kstrtouint+0x142/0x1a0 [ 603.202788] ? _kstrtoul+0x170/0x170 [ 603.206509] ? get_pid_task+0xd4/0x190 [ 603.210397] packet_ioctl+0xcb/0x2b0 [ 603.214109] sock_do_ioctl+0xde/0x300 [ 603.217907] ? compat_ifr_data_ioctl+0x160/0x160 [ 603.222658] ? kasan_check_read+0x11/0x20 [ 603.226806] ? mark_held_locks+0x100/0x100 [ 603.231052] sock_ioctl+0x32b/0x610 [ 603.234687] ? dlci_ioctl_set+0x40/0x40 [ 603.238659] ? __fget+0x340/0x540 [ 603.242103] ? find_held_lock+0x35/0x130 [ 603.246148] ? __fget+0x340/0x540 [ 603.249599] ? dlci_ioctl_set+0x40/0x40 [ 603.253583] do_vfs_ioctl+0xd6e/0x1390 [ 603.257469] ? ioctl_preallocate+0x210/0x210 [ 603.261864] ? __fget+0x367/0x540 [ 603.265307] ? iterate_fd+0x360/0x360 [ 603.269092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 603.274632] ? fput+0x128/0x1a0 [ 603.277913] ? security_file_ioctl+0x93/0xc0 [ 603.282319] ksys_ioctl+0xab/0xd0 [ 603.285783] __x64_sys_ioctl+0x73/0xb0 [ 603.289676] do_syscall_64+0x103/0x610 [ 603.293576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.298784] RIP: 0033:0x457e39 09:23:47 executing program 1 (fault-call:2 fault-nth:0): r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 603.301983] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 603.320880] RSP: 002b:00007ff4c3335c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 603.320896] RAX: ffffffffffffffda RBX: 00007ff4c3335c90 RCX: 0000000000457e39 [ 603.320905] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000003 [ 603.320914] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 603.320923] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff4c33366d4 [ 603.320932] R13: 00000000004c34e6 R14: 00000000004d6250 R15: 0000000000000004 09:23:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e6}, 0x28) 09:23:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_sl_0\x00\x04\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:47 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:47 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x89ffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00H', 0x2000000c0ffffff}) [ 603.721535] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.736661] device bridge_slave_0 left promiscuous mode [ 603.992007] device bridge_slave_0 entered promiscuous mode [ 603.998904] FAULT_INJECTION: forcing a failure. [ 603.998904] name failslab, interval 1, probability 0, space 0, times 0 [ 604.010513] CPU: 0 PID: 7664 Comm: syz-executor.3 Not tainted 5.0.0-rc5+ #69 [ 604.017712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.027072] Call Trace: [ 604.029697] dump_stack+0x172/0x1f0 [ 604.033341] should_fail.cold+0xa/0x1b [ 604.037267] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 604.042388] ? mark_held_locks+0x100/0x100 [ 604.046622] ? __schedule+0x81f/0x1cc0 [ 604.050516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 604.056061] ? should_fail+0x14d/0x85c [ 604.059966] __should_failslab+0x121/0x190 [ 604.064324] should_failslab+0x9/0x14 [ 604.068145] kmem_cache_alloc_node_trace+0x5a/0x720 [ 604.073165] ? __alloc_skb+0xd5/0x5e0 [ 604.076970] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 604.082422] __kmalloc_node_track_caller+0x3d/0x70 [ 604.087340] __kmalloc_reserve.isra.0+0x40/0xf0 [ 604.092027] __alloc_skb+0x10b/0x5e0 [ 604.095742] ? skb_scrub_packet+0x440/0x440 [ 604.100079] ? if_nlmsg_size+0x4b8/0xa00 [ 604.104140] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 604.108709] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 604.113454] rtmsg_ifinfo+0x8d/0xa0 [ 604.117076] __dev_notify_flags+0x235/0x2c0 [ 604.121402] ? dev_change_name+0xa20/0xa20 [ 604.125632] ? __dev_change_flags+0x513/0x6e0 [ 604.130121] ? dev_set_allmulti+0x30/0x30 [ 604.134266] ? __lock_is_held+0xb6/0x140 [ 604.138335] dev_change_flags+0x10d/0x170 [ 604.142481] devinet_ioctl+0x1396/0x1c60 [ 604.146535] ? _copy_from_user+0xdd/0x150 [ 604.150675] inet_ioctl+0x1fc/0x370 [ 604.154302] ? __lock_acquire+0x53b/0x4700 [ 604.158530] ? inet_stream_connect+0xa0/0xa0 [ 604.162938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 604.168491] ? mark_held_locks+0x100/0x100 [ 604.172722] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 604.177730] ? kstrtouint+0x142/0x1a0 [ 604.181526] ? _kstrtoul+0x170/0x170 [ 604.185246] ? get_pid_task+0xd4/0x190 [ 604.189134] packet_ioctl+0xcb/0x2b0 [ 604.192847] sock_do_ioctl+0xde/0x300 [ 604.196652] ? compat_ifr_data_ioctl+0x160/0x160 [ 604.201397] ? kasan_check_read+0x11/0x20 [ 604.205550] ? mark_held_locks+0x100/0x100 [ 604.209798] sock_ioctl+0x32b/0x610 [ 604.213451] ? dlci_ioctl_set+0x40/0x40 [ 604.217422] ? __fget+0x340/0x540 [ 604.220877] ? find_held_lock+0x35/0x130 [ 604.224941] ? __fget+0x340/0x540 [ 604.228389] ? dlci_ioctl_set+0x40/0x40 [ 604.232370] do_vfs_ioctl+0xd6e/0x1390 [ 604.236248] ? ioctl_preallocate+0x210/0x210 [ 604.240641] ? __fget+0x367/0x540 [ 604.244081] ? iterate_fd+0x360/0x360 [ 604.247878] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 604.253400] ? fput+0x128/0x1a0 [ 604.256670] ? security_file_ioctl+0x93/0xc0 [ 604.261076] ksys_ioctl+0xab/0xd0 [ 604.264536] __x64_sys_ioctl+0x73/0xb0 [ 604.268411] do_syscall_64+0x103/0x610 [ 604.272303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.277480] RIP: 0033:0x457e39 [ 604.280668] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 604.299563] RSP: 002b:00007ff4c3335c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 604.307265] RAX: ffffffffffffffda RBX: 00007ff4c3335c90 RCX: 0000000000457e39 [ 604.314541] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000003 [ 604.321805] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 604.329064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff4c33366d4 [ 604.336324] R13: 00000000004c34e6 R14: 00000000004d6250 R15: 0000000000000004 09:23:47 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x2, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e7}, 0x28) 09:23:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 604.359695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.369611] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.376074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.386438] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.392869] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfdffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x8c, r2, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffff80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x714}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1a1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4840}, 0xc0c4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r3 = accept(r1, &(0x7f0000000000)=@l2, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x2, 0x2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000180)={r4, 0x8}, 0x8) 09:23:48 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5411, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:48 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x541b, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 604.836300] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.844514] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.850934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.867451] device bridge_slave_0 left promiscuous mode 09:23:48 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5421, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 09:23:48 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5450, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:49 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5451, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 605.198434] device bridge_slave_0 entered promiscuous mode 09:23:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:49 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5452, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 605.479461] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.487281] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.493664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.501467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e8}, 0x28) [ 605.525225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:49 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5460, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 605.839076] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.847154] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.853558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.862000] device bridge_slave_0 left promiscuous mode 09:23:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000040)=0x1c, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x9, 0x4) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 09:23:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8901, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 606.213191] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.220570] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.227026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.233950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.243401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8902, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 606.580206] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.588771] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.595253] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8903, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4e9}, 0x28) 09:23:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffa888, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8904, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 606.899068] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.907066] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.913517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.920792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.931496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8906, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:51 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8907, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 607.307148] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.316452] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.322941] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bri\x81\xed\x00\x00\x00\x00\x00\x00e_0\x00?', 0x2000000c0ffffff}) 09:23:51 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890b, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffca88, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ea}, 0x28) [ 607.510820] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.518565] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.525024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.531903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 607.540801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 607.825546] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.833344] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.839896] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffdd86, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 608.022772] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4eb}, 0x28) 09:23:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 608.299809] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.308294] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.314743] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0xb09daf5c7d2bcc3e, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@multicast1}, &(0x7f0000000100)=0xc) 09:23:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffff000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ec}, 0x28) [ 608.484730] net_ratelimit: 20 callbacks suppressed [ 608.484738] protocol 88fb is buggy, dev hsr_slave_0 [ 608.494842] protocol 88fb is buggy, dev hsr_slave_1 [ 608.661778] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.671337] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.677811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.686436] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.692837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.700265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ed}, 0x28) [ 608.709306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffff84, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890d, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 608.874788] protocol 88fb is buggy, dev hsr_slave_0 [ 608.879966] protocol 88fb is buggy, dev hsr_slave_1 [ 608.954742] protocol 88fb is buggy, dev hsr_slave_0 [ 608.959835] protocol 88fb is buggy, dev hsr_slave_1 [ 608.965004] protocol 88fb is buggy, dev hsr_slave_0 [ 608.970177] protocol 88fb is buggy, dev hsr_slave_1 09:23:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8915, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 609.034737] protocol 88fb is buggy, dev hsr_slave_0 [ 609.039896] protocol 88fb is buggy, dev hsr_slave_1 09:23:53 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x20000000, 0x9}) [ 609.098437] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.105942] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.112319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.120713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.136526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffff88, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ee}, 0x28) [ 609.358749] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.366840] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.373187] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:53 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8916, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 609.627466] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.635711] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.642204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.652397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.661179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:53 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8917, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 609.961699] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.969759] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.976243] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ef}, 0x28) 09:23:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffff89, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) clock_gettime(0x0, &(0x7f0000003bc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000000c0)=""/185, 0xb9}, {&(0x7f0000000180)=""/115, 0x73}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000200)=""/96, 0x60}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/220, 0xdc}, {&(0x7f0000001480)=""/225, 0xe1}, {&(0x7f0000001580)=""/212, 0xd4}, {&(0x7f0000001680)=""/56, 0x38}], 0x9, &(0x7f0000001780)=""/222, 0xde}, 0x127d}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000001880)=""/224, 0xe0}, {&(0x7f0000001980)=""/74, 0x4a}, {&(0x7f0000001a00)=""/121, 0x79}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/4096, 0x1000}], 0x5, &(0x7f0000003b00)=""/33, 0x21}, 0x5}], 0x2, 0x2000, &(0x7f0000003c00)={r1, r2+10000000}) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000003c40)="d749a8665d0d64bdc25f1b95d5cd7c9f15bb22c2abf318c184342c325f85e6522a8d694f7671", 0x26) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 610.197923] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:54 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8918, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:54 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8919, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 610.570506] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.578633] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.585081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.594228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.601793] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.608253] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f0}, 0x28) 09:23:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 610.829397] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.837127] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.843618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.853493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.050607] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.058957] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.065402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.073380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891a, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891b, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 611.312567] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.320077] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.326514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.333903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.354832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f1}, 0x28) 09:23:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ifb0\x00', r1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f2}, 0x28) [ 611.696464] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.706087] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.712530] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891c, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8934, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 611.991971] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.002504] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.008983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.022205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 612.044857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8935, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 612.321671] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8940, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 612.514231] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.522055] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.528528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.536760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.551977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f3}, 0x28) 09:23:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/164, 0xa4}, {&(0x7f00000002c0)=""/169, 0xa9}], 0x2, &(0x7f0000000380)=""/195, 0xc3}, 0x2020) sendto$packet(r0, &(0x7f00000000c0)="a7904ab0d94a76c6a7f6f55541c2fb8fe3c57c33fb466c0f343e3119e8292feff1964305a6ab347b67b7adc5bf66bf5cd62a309aeaf914d9b67f93c622a0b1c005496aaa793958206809285f5ea7dfc8c88f42c6dbc2a77ce52d86f9ce2f232436763f70a179b90cbfa47784e1734ba0ffd53402260579d9522f9fc9c438edf6e8822489c325d4ae93aca4fb2271901834f9a930da462069332273eca24fd37f7e", 0xa1, 0x20000000, &(0x7f00000004c0)={0x11, 0x0, r1, 0x1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) socketpair(0x9, 0x1, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0xfffffffffffffef7) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000500)={r0}) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000540)=0x2c, 0x4) pipe(&(0x7f0000005200)={0xffffffffffffffff}) socket$can_bcm(0x1d, 0x2, 0x2) connect$l2tp(r4, &(0x7f0000005240)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @remote}, 0x0, 0x0, 0x3, 0x3}}, 0x26) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'\x00', 0x2000000c0ffffff}) 09:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 612.576578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.584320] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.590734] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8941, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x894c, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 613.036882] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.045178] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.051554] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8953, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8955, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f4}, 0x28) [ 613.334414] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8980, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8981, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 613.698710] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.710207] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.716685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.954319] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.974580] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.980991] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0fffffd}) 09:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f5}, 0x28) 09:23:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8905, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:58 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8982, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 614.454573] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.464148] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.470654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.481473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.496129] bridge0: port 1(bridge_slave_0) entered blocking state 09:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 614.502524] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f6}, 0x28) 09:23:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 614.714838] net_ratelimit: 20 callbacks suppressed [ 614.714847] protocol 88fb is buggy, dev hsr_slave_0 [ 614.725022] protocol 88fb is buggy, dev hsr_slave_1 [ 614.742203] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.749749] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.756212] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:58 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8983, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 614.763199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:58 executing program 0: r0 = socket(0x8, 0x5, 0x3ff) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x5, 0x3}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x101, @remote, 0x9}}, 0x20, 0x5}, 0x90) r2 = socket$packet(0x11, 0x800000000000000, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x5, 0x5, 0x4, 0x1}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 615.071071] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.078220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f7}, 0x28) [ 615.114744] protocol 88fb is buggy, dev hsr_slave_0 [ 615.119843] protocol 88fb is buggy, dev hsr_slave_1 [ 615.194745] protocol 88fb is buggy, dev hsr_slave_0 [ 615.200085] protocol 88fb is buggy, dev hsr_slave_1 [ 615.205301] protocol 88fb is buggy, dev hsr_slave_0 [ 615.210388] protocol 88fb is buggy, dev hsr_slave_1 [ 615.284727] protocol 88fb is buggy, dev hsr_slave_0 [ 615.289930] protocol 88fb is buggy, dev hsr_slave_1 [ 615.332285] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.339598] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.346013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.353138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.365422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:23:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f8}, 0x28) [ 615.381064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.402020] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.408479] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:59 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a0, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:23:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) clock_gettime(0x0, &(0x7f000000a0c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000009e40)=[{{&(0x7f0000000200)=@can, 0x80, &(0x7f0000001680)=[{&(0x7f00000003c0)=""/190, 0xbe}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/213, 0xd5}, {&(0x7f0000001580)=""/223, 0xdf}], 0x4, &(0x7f00000016c0)=""/210, 0xd2}, 0x5}, {{&(0x7f00000017c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001840), 0x0, &(0x7f0000001880)=""/39, 0x27}, 0x3f}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000018c0)=""/155, 0x9b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/78, 0x4e}, {&(0x7f0000002a00)=""/229, 0xe5}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/4096, 0x1000}], 0x6, &(0x7f0000004b80)=""/232, 0xe8}, 0x80000001}, {{&(0x7f0000004c80)=@nfc_llcp, 0x80, &(0x7f0000006280)=[{&(0x7f0000004d00)=""/83, 0x53}, {&(0x7f0000004d80)=""/4096, 0x1000}, {&(0x7f0000005d80)=""/188, 0xbc}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)=""/183, 0xb7}, {&(0x7f0000005f80)=""/231, 0xe7}, {&(0x7f0000006080)=""/131, 0x83}, {&(0x7f0000006140)=""/116, 0x74}, {&(0x7f00000061c0)=""/169, 0xa9}], 0x9, &(0x7f0000006340)=""/40, 0x28}, 0x80000000}, {{&(0x7f0000006380)=@nl=@proc, 0x80, &(0x7f00000069c0)=[{&(0x7f0000006400)=""/154, 0x9a}, {&(0x7f00000064c0)=""/249, 0xf9}, {&(0x7f00000065c0)=""/148, 0x94}, {&(0x7f0000006680)=""/242, 0xf2}, {&(0x7f0000006780)=""/101, 0x65}, {&(0x7f0000006800)=""/1, 0x1}, {&(0x7f0000006840)=""/46, 0x2e}, {&(0x7f0000006880)=""/90, 0x5a}, {&(0x7f0000006900)=""/148, 0x94}], 0x9, &(0x7f0000006a80)=""/28, 0x1c}, 0x20}, {{&(0x7f0000006ac0)=@generic, 0x80, &(0x7f0000006e00)=[{&(0x7f0000006b40)=""/214, 0xd6}, {&(0x7f0000006c40)=""/138, 0x8a}, {&(0x7f0000006d00)=""/243, 0xf3}], 0x3, &(0x7f0000006e40)=""/17, 0x11}}, {{&(0x7f0000006e80)=@xdp, 0x80, &(0x7f0000007080)=[{&(0x7f0000006f00)=""/183, 0xb7}, {&(0x7f0000006fc0)=""/187, 0xbb}], 0x2, &(0x7f00000070c0)=""/130, 0x82}, 0x2}, {{&(0x7f0000007180)=@x25, 0x80, &(0x7f00000086c0)=[{&(0x7f0000007200)=""/224, 0xe0}, {&(0x7f0000007300)=""/47, 0x2f}, {&(0x7f0000007340)=""/4096, 0x1000}, {&(0x7f0000008340)=""/237, 0xed}, {&(0x7f0000008440)=""/166, 0xa6}, {&(0x7f0000008500)=""/230, 0xe6}, {&(0x7f0000008600)=""/114, 0x72}, {&(0x7f0000008680)=""/56, 0x38}], 0x8, &(0x7f0000008740)=""/156, 0x9c}, 0x8}, {{0x0, 0x0, &(0x7f0000008840)=[{&(0x7f0000008800)=""/29, 0x1d}], 0x1, &(0x7f0000008880)=""/53, 0x35}, 0x400}, {{&(0x7f00000088c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000009d80)=[{&(0x7f0000008940)=""/68, 0x44}, {&(0x7f00000089c0)=""/97, 0x61}, {&(0x7f0000008a40)=""/4096, 0x1000}, {&(0x7f0000009a40)=""/74, 0x4a}, {&(0x7f0000009ac0)=""/157, 0x9d}, {&(0x7f0000009b80)=""/27, 0x1b}, {&(0x7f0000009bc0)=""/147, 0x93}, {&(0x7f0000009c80)=""/197, 0xc5}], 0x8, &(0x7f0000009e00)=""/46, 0x2e}, 0x1ff}], 0xa, 0x40010000, &(0x7f000000a100)={r1, r2+30000000}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f000000a140)={0x0, @in6={{0xa, 0x4e22, 0x4, @empty, 0xffffffff}}, 0x8, 0x3}, &(0x7f000000a200)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f000000a240)={r4, 0x61, "b7015df3db189ca755ae8e0f484299c3a34a003c9f2b4e765398d67c7d49a5ea84e3a5afa7588092c6c68e6246d1c6a41ccc6f9aebb82543616a5c54a1181adb503d511083b88f7efb2fb7f5f806fecddc84c57714306513ce0c06f21aa899a562"}, &(0x7f000000a2c0)=0x69) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000000)={@empty, @multicast2}, &(0x7f0000000040)=0xc) [ 615.633862] bridge0: port 1(bridge_slave_0) entered disabled state 09:23:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8908, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 615.906410] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.915695] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.922120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.935000] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.941458] bridge0: port 1(bridge_slave_0) entered forwarding state 09:23:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4f9}, 0x28) 09:23:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 615.983804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.018356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8909, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:00 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a1, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 616.288510] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.296032] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.302500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.310059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.318262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 09:24:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fa}, 0x28) [ 616.563920] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.572067] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.578509] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890a, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:00 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x40049409, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 616.822266] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.831142] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.837570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.844730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:00 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x4020940d, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 617.153191] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.162254] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.168781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.185625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fb}, 0x28) 09:24:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 617.529600] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.539195] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.545645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.569915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 617.582033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) socket$caif_seqpacket(0x25, 0x5, 0x3) 09:24:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fc}, 0x28) 09:24:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc020660b, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 618.007842] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.017646] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.024143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.231940] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.372176] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.380341] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.386778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.393732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.402728] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.409165] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x806000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fd}, 0x28) [ 618.418108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:02 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 618.737988] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.745827] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.752290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.759644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.767732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$x25(r1, &(0x7f0000000000)="ce4eef", 0x3, 0x20000080, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) 09:24:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fe}, 0x28) [ 619.042476] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.050553] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.056995] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890d, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 619.273228] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.280852] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.287337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.294714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.303350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:03 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 619.579359] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.587702] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.594085] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ff}, 0x28) 09:24:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000440)=""/20, 0x14}, {&(0x7f00000003c0)=""/122, 0x7a}], 0x2, &(0x7f0000000080)=""/74, 0x4a}, 0x10003) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000300)={'broute\x00', 0x0, 0x4, 0x5, [], 0x1, &(0x7f0000000240)=[{}], &(0x7f0000000180)=""/5}, &(0x7f00000001c0)=0x78) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x5f8, 0x438, 0x0, 0x2b8, 0x0, 0x2b8, 0x528, 0x528, 0x528, 0x528, 0x528, 0x4, &(0x7f0000000100), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, [0xffffffff, 0x0, 0xff, 0xffffff00], [0x0, 0x0, 0xffffff00], 'ipddp0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x5e, 0xff, 0x2, 0x10}, 0x0, 0x290, 0x2b8, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x5, 0x2, 0x3, 0x6, 0x25, 0x5, [@dev={0xfe, 0x80, [], 0x1e}, @remote, @mcast2, @rand_addr="ec462fd87d1625ad635baf1eb86a8190", @mcast2, @dev={0xfe, 0x80, [], 0x2a}, @loopback, @ipv4={[], [], @multicast2}, @ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, @rand_addr="84f34eb051f308e51f5718d95bde9f99", @rand_addr="95673dd5c1523af6de2cac7fbca1154d", @rand_addr="98bc5c710c407356abe847a079be5710", @mcast2, @local], 0x9}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x7f, 0x7, 0x2d, 0x6, 0x7f, @ipv4={[], [], @remote}, @mcast2, @ipv4={[], [], @loopback}, [0xffffffff, 0x0, 0xffffffff], [0xffffffff], [0xff, 0xffffff00, 0xffffffff], 0x248, 0x40}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x158, 0x180, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x68, 0x5, 0x9, 0x8, @ipv4={[], [], @empty}, @loopback, @ipv4={[], [], @empty}, [0xffffffff, 0xff000000, 0xff], [0xffffff00, 0xffffffff, 0xff000000, 0xff000000], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], 0x20, 0x40}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x80}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xa}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x658) [ 619.800724] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.809961] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.816368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.824264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.832870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890e, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 620.103423] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.114403] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.120938] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:04 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x500}, 0x28) 09:24:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8910, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 620.329231] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 620.591163] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.601187] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.607621] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x501}, 0x28) 09:24:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) 09:24:04 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8912, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x502}, 0x28) 09:24:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 620.964772] net_ratelimit: 20 callbacks suppressed [ 620.964781] protocol 88fb is buggy, dev hsr_slave_0 [ 620.974850] protocol 88fb is buggy, dev hsr_slave_1 [ 621.136252] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.149647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 621.158138] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.164588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 621.172463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 621.180043] bridge0: port 1(bridge_slave_0) entered blocking state 09:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x1c00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 621.186519] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x503}, 0x28) 09:24:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) 09:24:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8915, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:05 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 621.354814] protocol 88fb is buggy, dev hsr_slave_0 [ 621.359937] protocol 88fb is buggy, dev hsr_slave_1 [ 621.434733] protocol 88fb is buggy, dev hsr_slave_0 [ 621.439998] protocol 88fb is buggy, dev hsr_slave_1 [ 621.445157] protocol 88fb is buggy, dev hsr_slave_0 [ 621.450254] protocol 88fb is buggy, dev hsr_slave_1 [ 621.514830] protocol 88fb is buggy, dev hsr_slave_0 [ 621.520066] protocol 88fb is buggy, dev hsr_slave_1 09:24:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x504}, 0x28) 09:24:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 621.569535] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2100000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:05 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff019078ac2314bbac1414110c04907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f0000ffff000000ffffffff00000000e000000100000000ac141400000000000000000000000000000000"], 0x0) 09:24:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2900000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:05 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 621.775367] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.781918] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0xb4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a40)=[{0x10, 0x0, 0x2}], 0x10}}], 0x1, 0x800) 09:24:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x505}, 0x28) 09:24:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8917, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="edf03e24b520fd37981f3c4106c47cd07066eca05ff5ccc06da3c321adb64b1744e69f009fefc4239f7daed164a1e1e66b9705ebf014e6cc843f9de5852864f8c39ca14bdd2e813a9f4c8b359278aebaf23f70bb9a04378bbe65d66ee709eaf9e1de19283522b8a0e1ff8b7311d57a7ecb104e26c541d10c6a0c60e45f159165a7ca475d1498a15bbfbddccb8c8dbd2de8148aa88c7b5e1253b4c044c03d72dee3185621253c7a57078991f50d0b10a2664c68a84c9dfc0542c7ae27cae8ae062f6d53f85682977baf5ee9593643baa5630f418281e114", 0x0}, 0x18) 09:24:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1c8) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0xe39) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x20}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) write$cgroup_int(r0, &(0x7f0000000000), 0xff2a) 09:24:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1c8) write$binfmt_elf32(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0xe39) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x20}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffff}) write$cgroup_int(r0, &(0x7f0000000000), 0xff2a) [ 622.238635] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.262624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 622.274053] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.280526] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2b00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x506}, 0x28) 09:24:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2d012e2f66a44efdee1c11fb993dae8189c3b5fdbe455a9dff18960c3793dcac3309e89552c97d5d62a0314819a5e973671b3bdd63bbf68af4f0a9635e9514b31840b4a55668674be6f530c1c0376c18989102acedb0e3234cd0f95dfa255c5caddebd1f59e2a5ee9572b1620c5bf8bddbc5e2c67e04ec0a8da5f07efaba7c2dea2b5f389d722d05c5732a"], 0x1) 09:24:06 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2c00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:06 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 09:24:06 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000000500)="87", 0x1}], 0x1}}], 0x1, 0x10) 09:24:06 executing program 0: 09:24:06 executing program 0: 09:24:06 executing program 0: [ 622.910018] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.934872] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.941340] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x507}, 0x28) 09:24:07 executing program 0: 09:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x2f00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:07 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 623.215405] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:07 executing program 0: 09:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3200000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891a, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x508}, 0x28) 09:24:07 executing program 0: [ 623.351068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.370925] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.377368] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$netlink(0x10, 0x3, 0x0) write(r2, &(0x7f0000005c00), 0x0) socket$packet(0x11, 0x0, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 623.741194] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.749177] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.755590] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3300000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:07 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x509}, 0x28) 09:24:07 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50a}, 0x28) 09:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3a00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 624.279265] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.298159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 624.305966] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.312351] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:08 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 624.735136] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50b}, 0x28) [ 624.832831] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.839276] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:09 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:09 executing program 1: r0 = socket(0x0, 0xf, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x9, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x10000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0xedc4}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r3, 0x6}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x14) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000900)={&(0x7f00000007c0)={0x1d, r5}, 0x10, &(0x7f00000008c0)={&(0x7f0000000840)={0x5, 0x0, 0xd35, {r6, r7/1000+30000}, {}, {0x0, 0x4, 0x2, 0x8001}, 0x1, @can={{0x0, 0x95, 0x101, 0xffffffffffffffff}, 0x4, 0x2, 0x0, 0x0, "aac8a2ff9b818763"}}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x84) getpeername(r2, &(0x7f0000000000)=@ax25={{0x3, @netrom}, [@rose, @bcast, @remote, @default, @remote, @null, @default, @netrom]}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r3, 0x58, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x8001, @rand_addr="05e6e438d71c4254a8ddcb359da2ebc1", 0x1}, @in6={0xa, 0x4e20, 0x1, @rand_addr="4eef9775e76f37b2091e983cbb2d2686", 0x2}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e24, @empty}]}, &(0x7f00000003c0)=0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8925, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50c}, 0x28) 09:24:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4305000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 625.804431] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.907433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.922150] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.928673] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:09 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x80000001}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000780)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r3, 0x2, 0x4, 0x3, 0x8, 0x3}, 0x14) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) socket$inet6(0xa, 0x0, 0x400) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) 09:24:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50d}, 0x28) 09:24:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8934, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:10 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 626.419022] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50e}, 0x28) 09:24:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8935, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 626.564312] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.570766] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:10 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$FIDEDUPERANGE(0xffffffffffffff9c, 0xc0189436, &(0x7f0000000100)={0x1, 0x1000, 0x7, 0x0, 0x0, [{r0, 0x0, 0x400}, {r2, 0x0, 0x8001}, {r1, 0x0, 0x6c0}, {r2, 0x0, 0x5}, {r1, 0x0, 0x7530d414}, {r3, 0x0, 0xff}, {r1, 0x0, 0x8000}]}) 09:24:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8004020000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50f}, 0x28) [ 626.913393] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.922065] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.928559] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x893e, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:10 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0xffffffffffffffff, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x800e000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:11 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 627.194820] net_ratelimit: 18 callbacks suppressed [ 627.194829] protocol 88fb is buggy, dev hsr_slave_0 [ 627.204941] protocol 88fb is buggy, dev hsr_slave_1 09:24:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x510}, 0x28) [ 627.594789] protocol 88fb is buggy, dev hsr_slave_0 [ 627.600035] protocol 88fb is buggy, dev hsr_slave_1 [ 627.674730] protocol 88fb is buggy, dev hsr_slave_0 [ 627.680017] protocol 88fb is buggy, dev hsr_slave_1 [ 627.685202] protocol 88fb is buggy, dev hsr_slave_0 [ 627.690266] protocol 88fb is buggy, dev hsr_slave_1 [ 627.754800] protocol 88fb is buggy, dev hsr_slave_0 [ 627.760035] protocol 88fb is buggy, dev hsr_slave_1 [ 627.773581] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.789993] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.796452] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x511}, 0x28) 09:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8035000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:11 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)={0x404, r3, 0x208, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb8, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5b0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_BEARER={0x150, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xabb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x63c7}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbe3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1d93, @local, 0x2f}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x100, @rand_addr="a169ddd5e780af421dd72bca002d4025", 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x800, @ipv4={[], [], @loopback}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @local}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @rand_addr="8472fd163994e80c8b2aea1792c0cc11", 0x4}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xadf}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x39030e1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffcb25}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x10000}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @remote, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8000, @ipv4={[], [], @loopback}, 0x6}}}}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xaa9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x404}}, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004040) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:12 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 628.453516] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.469282] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.475710] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8100000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x512}, 0x28) 09:24:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x84ffffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x513}, 0x28) 09:24:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:12 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)=0x9, 0x4) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000480)) r2 = socket$packet(0x11, 0x0, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000080)=0x68) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\''}, {0x20, 'vmnet1'}, {0x20, 'bridge_slave_0\x00'}, {0x20, 'bridge_slave_0\x00\x04'}, {0x20, 'bridge_slave_0\x00'}, {0x20, 'bridge_slave_0\x00'}, {}, {0x20, 'bridge_slave_0\x00\x04'}], 0xa, "00f05f6692691e2d0dd5d4804eaafe733776e748c88c10f2f9fc61c1550c09870c22c4880a26078b4003b2b8ad58ef9e2761b11cd66553970eccd50a3d972e5610be6ad7a2a3a4952608e597a78b9f6acc929470ee6cdf487169632f8d78fd825f324af365afeba821bd6ff750a8551e53d532b4b9aeda"}, 0xde) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000003c0)={r4, 0x61, "c53b33545a36c7d5f12e5d9435c05405bbf06ed22f13cd67d595a1e2b7c7bbdf2b75a6595113a8d85cbd37a823c2c00ccb7778716af5422b4ca1635e2e1494aa30baf641d5f815b633e8adf17b2ba16e904640fd505017498acfc00da18ea72dce"}, &(0x7f0000000440)=0x69) socket$netlink(0x10, 0x3, 0x5) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={r4, 0x29, "80dca7a97022bb527fff8d8c5ef7b6114156472afd134ecafd0657a979371b96b48229b98e496d2e19"}, &(0x7f0000000040)=0x31) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) recvfrom$netrom(r2, &(0x7f0000000300)=""/42, 0x2a, 0x2001, &(0x7f0000000340)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 629.031114] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.047866] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.054325] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8953, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:13 executing program 1: r0 = socket(0x5, 0x5, 0x2000000000000) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:13 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x514}, 0x28) [ 629.700997] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.709297] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.715740] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x515}, 0x28) 09:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8847000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8955, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:13 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$FICLONE(r0, 0x40049409, r1) r2 = socket(0x800000000000a, 0x80005, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000000)) 09:24:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x516}, 0x28) [ 630.193344] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.309062] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.315519] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x517}, 0x28) 09:24:14 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x48, r2, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008091) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8848000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:14 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 630.962843] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.971263] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.977711] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x518}, 0x28) 09:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8864000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:15 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e22, 0x1d37, @ipv4={[], [], @broadcast}}}, 0x0, 0x10000, 0x5, 0x1, 0x7f}, &(0x7f0000000080)=0x98) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:15 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 631.641845] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.661787] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.668286] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88a8ffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x519}, 0x28) 09:24:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:15 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x3, 0x1, 0x0, 0xffffffffffff3f28, 0x8000}, 0xffffffffffffffbb) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000100)={0x1ff, 0x1, 0x101, 0x81, 0x8}, 0xc) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 632.079395] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.087643] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.093997] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51a}, 0x28) 09:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88caffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:16 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 632.760647] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.774153] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.780613] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51b}, 0x28) 09:24:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x88ffffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:16 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') clock_gettime(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51c}, 0x28) 09:24:16 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8906000000000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 633.278246] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 633.393033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.415729] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.422215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.434843] net_ratelimit: 20 callbacks suppressed [ 633.434851] protocol 88fb is buggy, dev hsr_slave_0 [ 633.444957] protocol 88fb is buggy, dev hsr_slave_1 09:24:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51d}, 0x28) [ 633.834777] protocol 88fb is buggy, dev hsr_slave_0 [ 633.839921] protocol 88fb is buggy, dev hsr_slave_1 09:24:17 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x89ffffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 633.914063] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.920592] protocol 88fb is buggy, dev hsr_slave_0 [ 633.925709] protocol 88fb is buggy, dev hsr_slave_1 [ 633.930829] protocol 88fb is buggy, dev hsr_slave_0 [ 633.935950] protocol 88fb is buggy, dev hsr_slave_1 09:24:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 633.994741] protocol 88fb is buggy, dev hsr_slave_0 [ 633.999847] protocol 88fb is buggy, dev hsr_slave_1 09:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51e}, 0x28) 09:24:18 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000180)=0x4002) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x40000) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x24) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={r3, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$inet6_tcp_int(r2, 0x6, 0x7, &(0x7f0000000140)=0x7f, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 634.149640] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.156116] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:18 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x8, 0x1, 0x7, 0x7, 0x8}, 0xc) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51f}, 0x28) [ 634.846114] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.855637] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.861980] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:18 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x520}, 0x28) 09:24:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:19 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x2, @ipv4={[], [], @broadcast}, 0x5}, {0xa, 0x4e22, 0x6, @mcast2, 0x100000000}, 0xe0, [0x7fffffff, 0x2, 0x2, 0x43, 0x5, 0x100000000, 0x8, 0x300]}, 0x5c) openat$cgroup_int(r0, &(0x7f0000000080)='io.weight\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x521}, 0x28) 09:24:19 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 635.414260] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.432081] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.438566] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x522}, 0x28) 09:24:19 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept4(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x3fd, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000240)='wlan0wlan1\x00', 0xb) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r0}) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000300)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000640)={r6, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0xc0000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000100)={'fiG\b\xeex\x00\x00\x00\x00\x00\a\r\x00\x00\x00\x00\x00\x00\xff\xff\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000000)=0xfffffffffffffea8) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xfe) 09:24:19 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 635.981762] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x523}, 0x28) 09:24:20 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x2, 0x300) bind(r3, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x3, 0x0, {0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x80) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x2, @remote, 0x200}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000000)={@empty, @broadcast, 0x0}, &(0x7f0000000040)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', r6}) 09:24:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x5, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 636.245552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.262774] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.269239] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x524}, 0x28) 09:24:20 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 636.660851] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.669044] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.675453] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x525}, 0x28) 09:24:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:20 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) read$alg(r0, &(0x7f0000000140)=""/160, 0xa0) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x184, r4, 0x600, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x144, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x2a}, 0x1f}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @empty, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}]}, 0x184}}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 637.130231] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.147539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.167696] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.174113] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:21 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x7, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x526}, 0x28) 09:24:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'\nridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:21 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x3ff, &(0x7f0000000080)=0x2) recvmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000100)=@x25, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)=""/87, 0x57}, {&(0x7f00000002c0)=""/173, 0xad}, {&(0x7f0000000200)=""/112, 0x70}, {&(0x7f0000000380)=""/217, 0xd9}], 0x4}, 0x40) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x8001, 0x2, 0x0, 0x4, 0x8, 0x7}, 0x20) [ 637.552719] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:21 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x527}, 0x28) 09:24:21 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$inet(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0xac, 0x6}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r2, 0x400, 0x6, [0x8f, 0x7ff, 0x4, 0x8, 0x6, 0x992a]}, 0x14) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x6, 0x80000000, 0x1, 0x9, 0x3, 0x5, 0x86d, 0x7, r4}, &(0x7f0000000040)=0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 637.703011] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.709535] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'b\nidge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x528}, 0x28) 09:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x9, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 638.104408] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.112695] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.119115] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:22 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x529}, 0x28) 09:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xb, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 638.608157] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.617070] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.623493] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'b%idge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:22 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52a}, 0x28) 09:24:22 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000804, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x11, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 639.082801] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.091178] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.097669] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:23 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52b}, 0x28) 09:24:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'br\ndge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x14, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:23 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000880)={0x0, @in6={{0xa, 0x4e22, 0x0, @loopback, 0x6}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000009c0)={0x0, 0x80000001}, &(0x7f0000000a00)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001300)={0x0, 0x3, 0x30, 0xfff, 0x25}, &(0x7f0000001340)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000940)={0x0, 0x1000000000000, 0xd25}, &(0x7f00000013c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001680)={0x0, 0x4, 0x5, 0x8}, &(0x7f00000016c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001740)={0x0, 0x1c, &(0x7f0000001700)=[@in6={0xa, 0x4e23, 0x0, @local, 0xce}]}, &(0x7f0000001780)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000017c0)={0x80000001, 0x24000000000000, 0x2, 0x9, 0x5, 0x75cd, 0x5, 0x6, 0x0}, &(0x7f0000001800)=0x20) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001980)={0x0, 0x100000001}, &(0x7f00000019c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001a00)={0x0, 0x5}, &(0x7f0000001a40)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001a80)={0x0, @in6={{0xa, 0x4e20, 0x5, @local, 0x7}}, 0xec, 0xfffffffffffffff8}, &(0x7f0000001b40)=0x90) sendmmsg$inet_sctp(r0, &(0x7f0000001c40)=[{&(0x7f0000000000)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000100)="a0548db95349326c182de93a510802629a1018ceb274e4cfc126ca10e63a0124cd05388b9e7f3b55363048a90fa8c8443f91c5f5844f3402eedcacff5ac07ee4277da613a51e8970b046ec6f35ae1aa32d9e0fd54772ce9d898996e882e3e7b0dab9e9ea05aa111768f99e1500852cdb0a40455c943dba54896bf557aba6590930bd2e356defa02f6c1b29185ec9242037", 0x91}, {&(0x7f0000000040)="0ceda7ae1fb4dcdecb", 0x9}], 0x2, 0x0, 0x0, 0x24008890}, {&(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000200)="d0224a6982d80ae5f30d7a1de30158c676075afd7125b76b4519f3", 0x1b}, {&(0x7f00000002c0)="db83025d1c6dec2d9d7ecc1f502feeeb2bba4a142e9ce8fdd7863280aacc2a43a9c30239ff2fe9e35bf1ac0600d63f1fab6813982605f31be40bd7cb5a35eddc128eecffa8b799ffcca7d3cbbfac8fe45879af3aa132e106e73f57cbfa7483fa81590db37a9d39c64cb89cf2eb42211f7ae5e563e84f9858cc3964678a0c98ee8a3bd968f8161d970e566176da02d6f0b92a48e0a55d307bb12123e7c34555abc7c7a7b044c9a6255c95a0c4d2540c746c", 0xb1}, {&(0x7f0000000380)="5e4738122bca70291315b4b3f816bffad697649f1719998e2150d3af101d0d9d28926791995ef3799522490110662b90041cae7e5caeaeb91495fcbc347a00d6bb222ede57cca8b05b47feb08b222c2844abe8450dfe416a813465d9c5a0affdff60a88e3d225d8fd00d21b526531d35cc599c790b2ba5222ec8163a8516acc319e0c7abb26779006a979a0a2d895ac27da2da071d21e7d3ad74f6c685d908a5530631b43b768a0eddb8ebad5f4dc1b4ca2ace4be404e91a4c9400ffa1c02d4ca422b4381b77c7c291eec1b35dd86e3e06adc229f920c61e", 0xd8}, {&(0x7f0000000240)="0507b72513ba011880311f6e30284ee6a6b1e0f458c6e05f5548b759ae864280abe1f70f51bfed92eb64ed5b964921880e63481ff8331ec51d3aa97084cf", 0x3e}, {&(0x7f0000000480)="643e032f3085b108ccb6296fd5931e713899b4f61f0b79186c5248de7e3f336169090440", 0x24}, {&(0x7f0000000780)="89889cf30b4d524f51469f6f5781617c380f14fbdd1e4ae82e1da74c45870ecf097c86664a766edc14f8797d8ec9888a8eacd716bd4e084cc9df54965118675697569e7673b62e58", 0x48}], 0x6, &(0x7f0000000a40)=[@init={0x18, 0x84, 0x0, {0x6, 0x4000000000000000, 0x59dec10d, 0x10000}}, @init={0x18, 0x84, 0x0, {0x8, 0x5, 0x3, 0x100}}, @sndrcv={0x30, 0x84, 0x1, {0x100000001, 0x3, 0x8000, 0xfd7, 0x8, 0x1, 0x7, 0x3ff, r1}}, @sndrcv={0x30, 0x84, 0x1, {0x2c, 0x7, 0x8209, 0x6, 0xffffffffffffff80, 0x8, 0x6, 0x9, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}], 0xb0, 0x1}, {&(0x7f0000000b00)=@in6={0xa, 0x4e23, 0x4, @empty, 0x6}, 0x1c, &(0x7f0000000e00)=[{&(0x7f0000000b40)="a802803e0ef3d2fee045dda123dcebade7231615889a4a1eec310616a520301a23eca051abe098095c2f0ae59a6ec6e5b24605578b08b3eb8dfc562cf4195c7b109f3956d03b1cfe2415fdccd561a934d58fb4cdbc107bd7eb72f8853685bbcd71f1909866e95f81ca6986df2e49ed2c33d27638", 0x74}, {&(0x7f0000000bc0)="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", 0xfd}, {&(0x7f0000000cc0)="28601fffd8f796a08583d248eaefe1b57f06b4f86794b0c616c95eed96e636f826abde872cf3ddffaf744902f8ba97bc1bb7be61c1ac", 0x36}, {&(0x7f0000000d00)="3b44f28e519389dece3cefd16698e900c5e1cf13a045bfcdcd82bc5fb8ddb2b45a97d3315c4242083a0f4df7cbac7daf2a429e3f10747d20001c99531cb4fd43f753caf93b0d85977397d32665e921fa3a6f64e562ca8aa684bb9dc25272e97ac61673c1981628eb5c72b0eb7f7765f72f4d616d947561bd58a0c544511fc44e52a8cb4ff797a19258d8013f518638c48116b03fa2a4d50e2285207e54aed55c6f97b10070ffa314c971a5394c68ca3e970a64a90b4819038ff96e84203f9118d6c7727f9a8d49d9c1d6", 0xca}], 0x4, &(0x7f0000000e40)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}, @init={0x18, 0x84, 0x0, {0x80, 0x6, 0x4230, 0x8}}], 0x30, 0x8800}, {&(0x7f0000000e80)=@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000ec0)="be09366fa78db0449747681879bbccdc5877b0155448", 0x16}, {&(0x7f0000000f00)="1a54c51cd23c1a82709df61d8d3ee9cf6dfb166a2dfd60bc908f1c7dff", 0x1d}, {&(0x7f0000000f40)="2ee9ae637747e738d55ae3b34a9db5a42718bd3a9faa6793de0272182454adb8e7bfdcec45b82a33ce85d56969b7f7ed6ff7a4b8d030d9e5f63334c7", 0x3c}, {&(0x7f0000000f80)="639f896dd6a94d0a2d3b63e28a9fddf12641afee132e1e0721a14fead74ae8b24279042c08a71355718d4624a2015ae89ab4f1d1eaefea565de75868cd19aca95127b1407890090f71ea9e3f7c22d805402cae340cb7224d5c9b5449a160a6d3b34741c760aa6b986a9e4278ecf98db57bbffe0deaa2059acfb04ba7fe6fe70a8e431785b6fc501a2ad9f54d51e99cecff41be4fc23236295aeaf6c63f0c7c37935657b292c3c31bc3c8add97573482d13b3bad949ee1a260963261dfdd185a57e803312e0c91a9446f288b5c85b86dd361a2e9923ad7940a2d091759b71ab5e61ee2ee3f87f9138b92768e1405513261351d0bfa2ce14cbca", 0xf9}, {&(0x7f0000001080)="a3eb2517afcb21abfe50a4623627393b6ed615b7c40f1d389819478d1ba1b983e2a638300eda3ff3e567f918422e27e75d6f1e0e182c9afe66780bf9b83c18eda95e9e1d3b0c9e6b970063abee731044c43f", 0x52}, {&(0x7f0000001100)="c88ca870c6f277a3e74c5c981ce81c575ff1fc86b4827244f43de6a17a61e6243a7f0649775aaa3a0e", 0x29}, {&(0x7f0000001140)="71190b0a29955a7c8154060ace545f7070142157f70e561cc160f92573f3f9dc4b57210c3fd3d7258aa4b5c3e734d087158911df122f8ce9ac5d764942414031e077e274d12f0da5d218ee18ac3068985ab273266fac0ac7e47ed8664928a5f17106e46ad32c04d94cc4374ad83f39024bb543a6c907a89fc55ceab0693cbc29957131406716ed91dee9973c686fabe0e1d5f584abe28cd8fcb060", 0x9b}, {&(0x7f0000001200)="b63a201951e5adbe81afe000806375846cce7f5bdd5726987a928fce8cf745a13f0cb21cd6f5d70987431fa23fc73d11815661558c8d32b0573cc8da48a221a7d80c8438", 0x44}], 0x8, &(0x7f0000001400)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x30, 0xffffffffffffffff}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x10001, 0x100, 0x8001, 0x40, 0x10001, 0x8, 0x7f, 0x8, r3}}, @sndrcv={0x30, 0x84, 0x1, {0x10000, 0x7d63, 0x200, 0x41bde642, 0x10000, 0x9, 0x6, 0x7, r4}}], 0xc8, 0x20000000}, {&(0x7f0000001500)=@in6={0xa, 0x4e24, 0xf4, @ipv4={[], [], @empty}, 0x1ff}, 0x1c, &(0x7f0000001640)=[{&(0x7f0000001540)="fd4f6b1446e12e2820a251f5eb1fdd79debdcc860a91f923c887b35f26e29520d82f27c696ab5558eb6db85690b46d7c780557afdeafa7e12b106fdb5d16ae213bfc3d55eace7c9a4becc16b8bac7c34a61ce99ef9336c23bdfed23b7c3c834f9845d0fb27cc01b9568508506edd75f11396c05e679280ac12c624fea7fb6143b5432ed4b2a84dd89d74b930204b8d04d1a7f73fb6f99311ba1bf58efed24f92150e76d826230791ff7fd788dd569f54caa01c37cd5b9b04b177b6f3c4c3a0eda0", 0xc1}], 0x1, &(0x7f0000001840)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8, 0x5, 0xffffffffffffffd0, r5}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x4, 0x7, 0x100000001, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x3c70, 0x2, 0x8008, 0x1, 0x1, 0x3f, 0x100000001, 0x20, r7}}], 0x70, 0x40}, {&(0x7f00000018c0)=@in6={0xa, 0x4e24, 0xf74, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffff033}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000001900)="7537dc61d481d55d37000b9f2f4cf9088a9b17b716c272b69fdaed153de0ba53e9c5704c7a37f439f6e8d0167127157dfc25b8d78f91", 0x36}], 0x1, &(0x7f0000001b80)=[@sndrcv={0x30, 0x84, 0x1, {0x60f65cbe, 0x9, 0x0, 0xffffffffffffff04, 0xffffffffffffffff, 0x9, 0x2, 0x5, r8}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x8002, 0xffff, 0x8, r9}}, @sndrcv={0x30, 0x84, 0x1, {0xe17a, 0x5, 0x4, 0x4, 0x21f7, 0x7, 0x7430f850, 0x3, r10}}, @authinfo={0x18, 0x84, 0x6, {0x8}}], 0x98, 0xc000}], 0x6, 0x8044) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r11, 0x40047452, &(0x7f0000000500)=0x3) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r12 = socket$packet(0x11, 0x2, 0x300) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001380)={0x64, 0x6, 0x5, 0x400000000000}, 0x8) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r12, &(0x7f0000000980)={0x40000010}) r13 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r13, 0x84, 0x70, &(0x7f0000000640)={r14, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 639.628904] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.643978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.661313] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.667773] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:23 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52c}, 0x28) [ 639.674756] net_ratelimit: 18 callbacks suppressed [ 639.674763] protocol 88fb is buggy, dev hsr_slave_0 [ 639.684889] protocol 88fb is buggy, dev hsr_slave_1 09:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:23 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000040)={0x2c, 0x0, r3, 0x37}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0x6, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x0, 0x488]}, &(0x7f0000000740)=0xc2) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'br%dge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52d}, 0x28) [ 640.037597] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.074731] protocol 88fb is buggy, dev hsr_slave_0 [ 640.079831] protocol 88fb is buggy, dev hsr_slave_1 09:24:24 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x100, 0xd94, 0x6, 0x4, 0x3b}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={r3, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x3ff, 0x401, 0x6, 0x6}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x21, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:24 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 640.234771] protocol 88fb is buggy, dev hsr_slave_0 [ 640.239929] protocol 88fb is buggy, dev hsr_slave_1 [ 640.254160] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.260639] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52e}, 0x28) 09:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x29, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52f}, 0x28) [ 640.843474] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:24 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x401, @remote, 0x3}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="1e7f5a3226df9eff583a9fa70593b98b21a774356910f283f4e6f67c7fb84a24e5762e25dc40892a6bba81bd50bc551a1ca6487f66f70be0c45f247dda37aff0097414c3c1ba348763cfe68d533c75e4f181418496b7e428ae18a1f9009d6ba4b36b3c1c70d114a66d1c9c212050050b2f4e04ff982350e9d36d7acf213cf6d118f5d44ddb5b900c1b1679d8536e62a62ec273f91a891e40b4108f449049e4f78b64086db91bddcc2d81fe9c40af09a7e7b70c46aac025e7141f1d4f02a1dc7cd9e7f47e7b07a231f5402898ae9d489f89456ef59b80189c69f00c1c090c035d3f95d9c9384e65281232851e3fb1522502ba65493566", 0xf6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bri\nge_slave_0\x00?', 0x2000000c0ffffff}) [ 640.988122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 641.005325] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.011711] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2b, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x530}, 0x28) 09:24:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 641.539769] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:25 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2c, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x531}, 0x28) 09:24:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bri%ge_slave_0\x00?', 0x2000000c0ffffff}) [ 641.694916] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.701349] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2f, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x532}, 0x28) [ 641.754723] protocol 88fb is buggy, dev hsr_slave_0 [ 641.759864] protocol 88fb is buggy, dev hsr_slave_1 09:24:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 642.067177] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.077618] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.084094] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:26 executing program 1: pipe(&(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000dc0)=0xffffffff7fffffff, 0x4) r1 = socket(0x0, 0x8b54d587608bc474, 0x2) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000000)) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='bic\x00', 0x4) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x8000, @mcast2, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x32, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 642.154750] protocol 88fb is buggy, dev hsr_slave_0 [ 642.159947] protocol 88fb is buggy, dev hsr_slave_1 09:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x533}, 0x28) 09:24:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'brid\ne_slave_0\x00?', 0x2000000c0ffffff}) 09:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x33, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 642.535550] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.546227] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.552693] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x534}, 0x28) 09:24:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:26 executing program 1: r0 = socket(0x15, 0x803, 0x81) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) r2 = socket(0x800000000000a, 0x80005, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 642.944250] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.952564] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.959032] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3a, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x535}, 0x28) 09:24:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridfe_slave_0\x00?', 0x2000000c0ffffff}) 09:24:27 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x0, r2, 0x2f, r0}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80800) r3 = socket$inet6(0xa, 0xb, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@remote={[], 0x1}, 0x7, 'rose0\x00'}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3c, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x536}, 0x28) [ 643.467630] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 643.731617] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x537}, 0x28) 09:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6c, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:27 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000040)=@null) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000100)=0x6, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0xfffffffffffffe5b) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x8001, 0x8, 0x8, 0x8000}, 0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window={0x3, 0x9, 0x3ff}, @window={0x3, 0x3f, 0x6}, @sack_perm, @timestamp, @mss={0x2, 0x101}, @timestamp, @timestamp], 0x7) [ 643.906081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 643.913862] bridge0: port 1(bridge_slave_0) entered blocking state [ 643.920281] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridhe_slave_0\x00?', 0x2000000c0ffffff}) [ 644.356319] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.368342] bridge0: port 1(bridge_slave_0) entered blocking state [ 644.374789] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x538}, 0x28) 09:24:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:28 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) r3 = socket$inet6(0xa, 0x4, 0x81) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xfe, "3adcd66846107279b0dd41af83733ae68723a1ec192b36a49d0ba3f03bc905799584ae3f61915e1383530afec912981444a84cd826403783edeb7596ed54996234c68920325c6e9eb20de69505a23d6c7296a695d9349cc1b8cc418c789fe0a64b0716b52db4dda22a9ff04bf3d88749c49dd206af3f9f95365d4397d3094a7b1d7ca66bde044078e97b46c16b2c2a91b6e04f1c745e6014f3991d1b69e29f514a5e0f0536808e3dca032cf73a5342ecb722c8149896cdf0bd76aad9f658958a47f1e87b4700c0be2d3bf4601142293807fa59e053d063659074e79f4e2a7dba2d540fa57053e7b33f896ec95423ea9ea1fcc9e57985d8e695fd567d1871"}, &(0x7f0000000000)=0x106) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000002c0)={r4, @in={{0x2, 0x4e20, @loopback}}, [0x1f, 0x6, 0x7f, 0x1, 0x9a, 0xac, 0x6, 0x5, 0x1e, 0x10000, 0x7f, 0x1, 0x9, 0x3b, 0x41]}, &(0x7f0000000040)=0x100) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0xe}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridg\n_slave_0\x00?', 0x2000000c0ffffff}) 09:24:28 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x300, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x539}, 0x28) [ 645.227368] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.236012] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.242432] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x500, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:29 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x656}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r2, 0x8, 0x40}, 0xc) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r2, 0x3, 0x8ad58c2, 0x401, 0xea, 0x7}, &(0x7f00000002c0)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) accept4$rose(r0, &(0x7f0000000100)=@short={0xb, @dev, @netrom}, &(0x7f0000000140)=0x1c, 0x80800) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000400)={@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}}, {&(0x7f0000000300)=""/173, 0xad}, &(0x7f00000003c0), 0x40}, 0xa0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r5, 0x5, 0x4}, &(0x7f0000000080)=0x8) 09:24:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:29 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 645.824798] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridg%_slave_0\x00?', 0x2000000c0ffffff}) 09:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x543, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53a}, 0x28) [ 645.915247] net_ratelimit: 14 callbacks suppressed [ 645.915255] protocol 88fb is buggy, dev hsr_slave_0 [ 645.925330] protocol 88fb is buggy, dev hsr_slave_1 09:24:29 executing program 1: r0 = socket(0x8000000000006, 0x804, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x112, r0, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000100)="7a1696c73a301d4d739633e03d58e084abe8a488b59a3b59ac331f82f18a8fc4735a0d1865c8caae8510a32a47c5f750df7740adf49c50d2a757319a6c768be4622b2acf9e21ad97f2f0c7efc96b329d4ede594c030e486e455aa7e83e5e363efaa34948446576ca0e4cb55175b94116f99cab76fe35a182d2106654a9b1a571b5a85df944cb4820d0c8894923aac5a85d31803989324c4d8a0b79bf59383708d1f611d8082b4b21de3aab64599a06b8ca031f4ba75f6db2d6ef333618064cd3d00f0febd5", 0xc5) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) ioctl$int_in(r2, 0x0, &(0x7f0000000000)=0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 646.017721] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.024183] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53b}, 0x28) 09:24:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x600, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 646.314742] protocol 88fb is buggy, dev hsr_slave_0 [ 646.319968] protocol 88fb is buggy, dev hsr_slave_1 [ 646.394758] protocol 88fb is buggy, dev hsr_slave_0 [ 646.399972] protocol 88fb is buggy, dev hsr_slave_1 [ 646.405132] protocol 88fb is buggy, dev hsr_slave_0 [ 646.410253] protocol 88fb is buggy, dev hsr_slave_1 [ 646.474739] protocol 88fb is buggy, dev hsr_slave_0 [ 646.479913] protocol 88fb is buggy, dev hsr_slave_1 [ 646.506815] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.515681] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.522103] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53c}, 0x28) 09:24:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x608, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:30 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0x81, 0x0, 0x3, 0xffffffff, 0x3ff, 0x5f, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0xffffffffffffff7f, 0x4f2, 0x3, 0x1]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:31 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 647.092097] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.108660] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.115187] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53d}, 0x28) 09:24:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridgf_slave_0\x00?', 0x2000000c0ffffff}) 09:24:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x689, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:31 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x7fff, 0x6}, &(0x7f0000000600)=0xd385aca91a573e02) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 647.514656] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.523403] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.529805] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53e}, 0x28) 09:24:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x700, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 648.109219] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.117607] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.124125] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge\nslave_0\x00?', 0x2000000c0ffffff}) 09:24:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x53f}, 0x28) 09:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x806, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:32 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:32 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) socket$caif_stream(0x25, 0x1, 0x0) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev={0xac, 0x14, 0x14, 0x23}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e22, 0x9, 0x4e24, 0x40, 0xa, 0x80, 0x20, 0x7f, r4, r5}, {0x1f, 0x9, 0xfff, 0x0, 0x100000000, 0x7, 0x3, 0xffffffffffffff80}, {0xe2, 0x7fffffff}, 0x3f, 0x6e6bb7, 0x0, 0x0, 0x3, 0x2}, {{@in=@broadcast, 0x4d4, 0x6c}, 0xa, @in=@multicast2, 0x34ff, 0x1, 0x3, 0xa0, 0x3ff, 0x7, 0x200000000000}}, 0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 648.533563] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.541591] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.548112] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x900, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x540}, 0x28) 09:24:32 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) accept4$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xb00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:33 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 649.251017] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_\nlave_0\x00?', 0x2000000c0ffffff}) [ 649.501997] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.530944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x541}, 0x28) [ 649.551923] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.558368] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:33 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000000)={r1, 0x9, 0x3, "650b2af822029f8c75c7e1b67acabf6afcdb52538fe61ed23667bdf232fa93284c53f648794a03083815424bbca646889d4dedfa7f1d840360f8a6ecc7993a384885411f2e0d61d94aa4bfac84c96dd5c7f482de7ccf7e9872ebf391b9753eef0b48de97585df5e3e013397bfd6bfcccb7668c85fd492722544174e59700e5bae0d14408bf59c0c2063f718bed0475a937c4c37290cb2aa94c69cfa005950e203319e3cd2b5bde04dec0ee5688c83ba36be79dd2"}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xe80, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_#lave_0\x00?', 0x2000000c0ffffff}) 09:24:33 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x542}, 0x28) 09:24:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1100, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 650.388712] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:34 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_dgram(0x28, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f0000000080)={0x6, 0x6, 0x5, 0xa8be, 0x3, 0x7, 0x9, 0x400000000}, &(0x7f0000000100)={0x3, 0x6, 0xbf, 0x5, 0xbf, 0x1, 0x8, 0x6}, &(0x7f0000000140)={0x328, 0x80, 0x6, 0x9, 0x3, 0x2, 0xb9, 0x8}, &(0x7f00000001c0)={r4, r5/1000+30000}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 650.494557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 650.502839] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.509320] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x543}, 0x28) 09:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1400, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 651.010776] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:34 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x544}, 0x28) 09:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_%lave_0\x00?', 0x2000000c0ffffff}) 09:24:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2100, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:35 executing program 1: r0 = socket(0x1000002, 0x80000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00\x04', 0x200}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="50d381b7cdbd262d44c5075491b4c8f8", 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@generic={0x3, 0x1}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r2, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r3, 0x100000001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200)=0x3, 0x4) socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x40200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'brid\xe6\xbb_\x861a\xc0\x00'}) 09:24:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x545}, 0x28) [ 651.363217] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.369697] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2900, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:35 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x546}, 0x28) 09:24:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_*lave_0\x00?', 0x2000000c0ffffff}) [ 651.951997] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x547}, 0x28) 09:24:35 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000000)={@rand_addr, 0x0}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', r2}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0xb2f3, 0xe7b, 0x1}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r3, 0x101, 0x10, 0x80, 0x9}, &(0x7f00000001c0)=0x18) socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x20000000000800, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 652.097367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.119093] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.125561] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2b00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 652.154743] net_ratelimit: 20 callbacks suppressed [ 652.154751] protocol 88fb is buggy, dev hsr_slave_0 [ 652.164886] protocol 88fb is buggy, dev hsr_slave_1 09:24:36 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 652.554727] protocol 88fb is buggy, dev hsr_slave_0 [ 652.559927] protocol 88fb is buggy, dev hsr_slave_1 [ 652.634719] protocol 88fb is buggy, dev hsr_slave_0 [ 652.639953] protocol 88fb is buggy, dev hsr_slave_1 [ 652.645113] protocol 88fb is buggy, dev hsr_slave_0 [ 652.650194] protocol 88fb is buggy, dev hsr_slave_1 [ 652.714736] protocol 88fb is buggy, dev hsr_slave_0 [ 652.719871] protocol 88fb is buggy, dev hsr_slave_1 [ 652.749504] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.759753] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.766224] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:36 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x61, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x548}, 0x28) 09:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2c00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x549}, 0x28) [ 653.368066] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.376740] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.383132] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:37 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_+lave_0\x00?', 0x2000000c0ffffff}) 09:24:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2f00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:37 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x5, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x7fffffff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0x3ff}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x4, 0x10}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r3, 0xb7d}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000780)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000000)=0x106) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3200, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54a}, 0x28) 09:24:37 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x100000000003, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 654.289395] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.298116] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.304562] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:38 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54b}, 0x28) 09:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3300, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:38 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'nr0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100)="7e55d7a947af1f7c56cbc4abd19e3d0f636a975a7b8bd8a39a996c5ad91133026595a4a827246b719ca9ff9c313f4cc84ea75a8afec43b36a9c714b1ff8fe92a9dffcd855dfa05448f6e5f5f281e7c88d362b944fceb5cf2b7f2d2c8a13e4c97ba33ce669d1f66096f11ce77578868934f36ffdfea8bbb906c67f38cb13131b9fd9533289274f83470f41662f1bb461989b9a5c3ca216f7eb0bf58f44f28a06ece3df767f4fb102265c8636027ea201a696b323fc0a361ac771440bcec2e72dcf5f4fd99f24d50d9e2e4be2279432a10f75b88c0278c63aa1ecf58ca6171099bc64c1889c78ed5c64565ca3324d4cbb97f98", 0xf2, 0x40000, &(0x7f0000000040)={0x11, 0xf5db91bfc33618fe, r5, 0x1, 0x3f, 0x6, @link_local}, 0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_-lave_0\x00?', 0x2000000c0ffffff}) 09:24:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54c}, 0x28) [ 654.735024] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3580, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:38 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x15) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x6, 0xb000}, 0x4) socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) r3 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@rand_addr="89540bd6fcf1ebe398b26bcdd1dfa1aa", @in6=@dev={0xfe, 0x80, [], 0x18}, 0x4e23, 0x0, 0x4e23, 0x7, 0x2, 0xa0, 0x0, 0x3b, r2, r3}, {0x2, 0x80000001, 0x1ff, 0xffffffffffffffbb, 0xc7c, 0x3, 0xb1, 0xff0}, {0x6, 0x1, 0x6, 0x8}, 0xffffffff7fffffff, 0x6e6bbe, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d5, 0x7c}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x3, 0x3, 0x8b, 0xfff, 0xfffffffffffffffa}}, 0xe8) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_.lave_0\x00?', 0x2000000c0ffffff}) 09:24:38 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54d}, 0x28) [ 655.024544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.059589] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.066032] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3a00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 655.574396] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54e}, 0x28) 09:24:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:39 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x25) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3c00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 655.743930] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.750439] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_0lave_0\x00?', 0x2000000c0ffffff}) 09:24:39 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54f}, 0x28) [ 656.425706] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.436298] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.442689] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x550}, 0x28) 09:24:40 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r2, 0x80, 0x30, 0x4, 0x7e}, &(0x7f0000000180)=0x18) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'team_slave_1\x00', 0x0}) recvfrom$packet(r0, &(0x7f0000000400)=""/116, 0x74, 0x23, &(0x7f00000004c0)={0x11, 0xff, r4, 0x1, 0x9, 0x6, @dev={[], 0xb}}, 0x14) socket$packet(0x11, 0x2, 0x300) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000380), &(0x7f00000003c0)=0x8) r5 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000780)={r3, 0x1000, "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"}, &(0x7f00000017c0)=0x1008) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) socket$caif_stream(0x25, 0x1, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x80, r7, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x13}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={r6, 0x12, "83c6d6fb90c4bb876875a1078bba84761d3e"}, &(0x7f0000000040)=0x1a) 09:24:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_Xlave_0\x00?', 0x2000000c0ffffff}) 09:24:40 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x551}, 0x28) [ 657.496969] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4788, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:41 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 657.962752] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.971586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.980415] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.986897] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:41 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4888, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x552}, 0x28) 09:24:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_clave_0\x00?', 0x2000000c0ffffff}) 09:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6488, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 658.394745] net_ratelimit: 20 callbacks suppressed [ 658.394754] protocol 88fb is buggy, dev hsr_slave_0 [ 658.404906] protocol 88fb is buggy, dev hsr_slave_1 09:24:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x553}, 0x28) [ 658.474113] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.493256] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.499828] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:42 executing program 1: r0 = socket(0x800000000000a, 0x806, 0x100000000000000) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x4, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000000)={0x3, 0x3}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6c00, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 658.794781] protocol 88fb is buggy, dev hsr_slave_0 [ 658.799990] protocol 88fb is buggy, dev hsr_slave_1 [ 658.874754] protocol 88fb is buggy, dev hsr_slave_0 [ 658.880086] protocol 88fb is buggy, dev hsr_slave_1 [ 658.885288] protocol 88fb is buggy, dev hsr_slave_0 [ 658.890403] protocol 88fb is buggy, dev hsr_slave_1 [ 658.954750] protocol 88fb is buggy, dev hsr_slave_0 [ 658.959892] protocol 88fb is buggy, dev hsr_slave_1 [ 659.097518] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.116645] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.123087] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x554}, 0x28) 09:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:43 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_dlave_0\x00?', 0x2000000c0ffffff}) 09:24:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:43 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xffffffff, 0x401, 0x404, 0x8001, 0x6}, &(0x7f0000000080)=0x253) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) 09:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x555}, 0x28) [ 659.632765] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.649629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.661919] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.668437] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8035, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x556}, 0x28) 09:24:43 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x100000000002) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:44 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 660.247265] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8100, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x557}, 0x28) 09:24:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_ilave_0\x00?', 0x2000000c0ffffff}) 09:24:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:44 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000180)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) bind$netrom(r0, &(0x7f0000000000)={{0x3, @null, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x48) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r3, r4, 0xb, 0x1}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x2, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8847, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 660.563806] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.570312] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x558}, 0x28) 09:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8848, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 661.117665] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.134855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 661.151097] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.157688] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x559}, 0x28) 09:24:45 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @multicast1}, &(0x7f0000000040)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x5) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_llave_0\x00?', 0x2000000c0ffffff}) 09:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8864, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55a}, 0x28) [ 661.685034] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.707008] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.713462] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:45 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/177, &(0x7f0000000100)=0xb1) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x26c09117, 0x3, 0x2000}, 0x18b) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'bond_slave_1\x00', 0x7}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55b}, 0x28) 09:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8906, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:46 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 662.282612] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.290889] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.297315] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55c}, 0x28) 09:24:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_olave_0\x00?', 0x2000000c0ffffff}) 09:24:46 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000180)="0adc1f233c123f3188a070") r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="240000002a0007011dfffd940101830020200a000900000006000000010000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x20480, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55d}, 0x28) [ 663.010161] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0ffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 663.118863] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.125313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.143475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55e}, 0x28) 09:24:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 663.602042] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.610912] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.617344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.628997] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_plave_0\x00?', 0x2000000c0ffffff}) 09:24:47 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x55f}, 0x28) 09:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x560}, 0x28) [ 664.109301] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.118308] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.124798] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:48 executing program 1: r0 = socket(0x800008000000a, 0x200080005, 0xffffffffffffa34b) socket$inet(0x2, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x561}, 0x28) [ 664.457797] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.476623] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.483022] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_ulave_0\x00?', 0x2000000c0ffffff}) 09:24:48 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:48 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000100)) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in={{0x2, 0x4e23, @local}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000004, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) write$binfmt_misc(r2, &(0x7f0000000000)={'syz1', "e7108da8229a17a22759ce761fb335a13ae2401bf3d57aa68098787f5f3e38dd0dd2644e233b704dea8441856725b9a989735dc98276ab7f5e7aa6fa865c8958859c2e98c951b9ebc008b6"}, 0x4f) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x562}, 0x28) [ 665.013409] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.034732] net_ratelimit: 20 callbacks suppressed [ 665.034740] protocol 88fb is buggy, dev hsr_slave_0 [ 665.044830] protocol 88fb is buggy, dev hsr_slave_1 [ 665.047591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x5000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 665.066797] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.073222] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:49 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000001c0)=""/151, &(0x7f00000000c0)=0x97) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getpeername$packet(r0, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000026c0)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000004000)={0x0, @loopback, @dev}, &(0x7f0000004040)=0xc) vmsplice(r2, &(0x7f0000006c00), 0x0, 0x3) sendmmsg(r1, &(0x7f0000006940)=[{{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x2711, @reserved}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)="8b3603f2b652d3f3e69c639976faccf9d97a778b64d55139c48c68745d5fec7ddf", 0x21}, {&(0x7f0000000380)="425bec62d71eed26b569a585fc230deb16d4fe41675234e1d0b828740ca43ed05c34e64b7001b9f4c1df8e59a6b8a00d33b5ef8903b5a3b1bd020e9bc486c53c60d06792360448db6a8468ef9cb7735532197e992c58b2bd323ba03b27b9aac5b03c280c64b08618a687fd6800bdb1aa910a4a07ab7df7221f39b4a88c05ca76793fe5a4b028f54453093664c12566c7447a181ecadde26a1a37ad2f4cd73f5255f7a56ee93170795a9c3c61b2eb20e53495500697808b6a104b47feac16fc04e6c8e44cb374075d4525c52da1e918", 0xcf}, {&(0x7f0000000780)="387c846c8b4cdb07c3d60d9a95f1ec48d2718ed47af3794d53706724d21914239ea8e857558c246c155f528d2b557308ef81fcc5fdb205f6e4bff12baa445deb7e877a794646f52c8959ba9d5ef02c32c8d4bb0ed3cc5a4f1766aceab21035aa5822bcbdec3e354647b4135042146bfc38663483141d57b8896b251d0c626bf89ab84c21c450916c09b5670e136f43f90587c683b71ed41c4fe6cd17318a77bfead22015560dbd5ccbcc471ffa", 0xad}], 0x3, &(0x7f0000000840)=[{0xf0, 0x84, 0xffffffff, "8dd81ddfe561c0c8699fc8094e0f97f01f7ccd4cd8c3becb7ef48b14b62df6ca8ed7940931250d3e005c9c0631d970626f94bbfe98ef1f1d36159b9679e9d344b3ee80235a5341734ba6f4b8edbe830c84fecf2c82ebc03793d3dbedf32dc638cf16a206c42320c9c6a75d70b85e216c917d0930f2dfa2d1c6da3e27652e5ce633430f8474fc269824924eb74a620a44fd31710f6e837d8d51f69828aed94eba2c3f8e013a757f03a42a93c60870a39db0dd6863089e3ebe1f566338023f202e8adba7e9bc36fcf39cf7727d4335692e59ed4ebe575b71d7394879ba36"}, {0x50, 0x117, 0x6, "6dd9fb6588d6fc905b8a0be78dbe5d0b5ad4da0a18ed4cb57185e72c2e400a8a14fbaf9e55aaf78f3a6ba3ca38ee467898c41144094d723eac4e"}, {0x90, 0x3a, 0x3, "3c27c7b4f255b0755388d0323d89bdc41902230499da2e141a25c5499f9b9d155835d44a2275d80e2a67bf09ff046a698ff9fdef5180a9724b424a45a1b69d1afeed129a23799e78226c9aab320c513a3f02f9ad1a100d8d77b29e81f877235c30eb8a6f64da73e23829d869c1af9b9f82d8747d7703f45d26ee1e48ea"}, {0x60, 0x1, 0x8, "1d2bd6d4ac04537d98a3e01979d8c76fcaf18b02b1879614ac7ad04d6191ae5ae04eafd83d32c1f14ffc6861032794d99d4a3a3cdfd6eb1d7f3da5438faca33864265c0c15f67badc8bfd7ee633d463d"}, {0x28, 0x119, 0x5, "405f3400c9c2c8fb982b7971bf9810cdf50d3362b4577705"}, {0xe8, 0x119, 0x4, "755628a5ba62d3b8a8ec533873ce9b1043169abf6de1ffca47ba045d9f14d2d65feed1e0f9299f3527d68fab8835bc4129492f0003b12c094c21c9c76d093199480d86429f2540971b0d046c3492a612a34091ed07750c2b9ebfb8710daed64633d31d7c80a148764a8ea116ad38f7c7647342a98e62625b842baa35fa41933ac533018488f22d53710a08229bbdf48cc5cdb2bdb600f323f0f9f575cafbdb085b3f3be5694578fbe46ba4824d7153d3e0feaa47c5f16964c2abffd55754400747cb6b4825c64badb9bdb96c27e1b6a8ec7f924ad8"}], 0x340}}, {{&(0x7f0000000cc0)=@hci={0x1f, r3, 0x3}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000d40)="d6fd02021c0c675c011ab48c17fae2592c34d856720cd47225ca546fbd285215d937aa2cbf23156056c82657e03fb2eb8a5b268a6738b8849aa3ceea1a50c4b98dd9b2127e0b87b9d5a514d427638dfe1bea71ba6dc7969641635bfddc5edb49763626b1f94acdad4c909bc70ebfea293e2b066ecc1287e81bb8b9c922648430149e8a3b912a17b3aaf6d335779912c1a63c99aa0727e9465135d86d8dce220646af09fed5b5764f4972e1f8177cdde2c7de7e5cdd4345d91d2afd1b41ce835b9a75d92cb485bfce5fa54cb46af6a4c5a485c6b3569470667c9bf60e9d3b0dd6e096344821a840215970b8153181d65dec5293e8f59ea43103", 0xf9}, {&(0x7f0000000e40)="1ebe92943756ab8ceaac3c6b316bac8f00016d63e5f47d3fa8609c13003a7edbe82410d9d4dafc982e607012b962e571a7d4a8192d9a4fea8bf423de221fc4be8359b171839b281c989b9b6ddb12a9041ba2508973163b8888d5332d743778cc7c13b6c671e98681fd8461550323622644976339e98a08fd11e81caea6752fd0efe44e96b174e84798154187eccce4c216442e4c9e1dd023849fb15952d0366b51859d7ef638e2ac4e48b8d64ec641040b4d879413f5865031a8d3f2d0ebbb5743a51df39000d545c05085ee687f8d599f6d78b955db0914f1e786435752d29f2575fec660617a52792346", 0xeb}, {&(0x7f0000000f40)="8e19fe963082a0db723ca460e3268b9fe8b4f99c2558ab5da666c9f448ecf6f5f298aecabe68eb8b96b3d4b5188490f7b65a48bdbbda8bc6ab252b28f3e7ece300e53cbbb02974791a8a6077f17000dd0765967e2ae7009bbfa02c2a495232bf8faa13e4cf16cd131d7355db372c7c20d86d91a99c268675195894ef31", 0x7d}, {&(0x7f0000000fc0)="c490c65f6de3fb4a40f88ed2f6871f5792204f97ac3c7193b7c82026487377cdcd0f10a1d0d9f1d8fe", 0x29}, {&(0x7f0000001000)="99dc2bbab6fe13dbfdbc2550304f2f0b5986fe66a45ecedf83b86867f24f73e4def93aa9c41e62e796fdca39a67f9bff561f826bb2c9162dce5c1f966fa1584839a1a72149afbe239d8d57e0179b3f099b", 0x51}], 0x5, &(0x7f0000001100)=[{0x1010, 0x10f, 0x10000, "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"}, {0x50, 0x109, 0xffffffff, "ec03a078c56127422659c70869bb9ac3723404159fe26b85c85dfff945c843bf4d0bdcd9d3d655f77c964598635b929e6559af54afda46699e94cd"}, {0x20, 0x117, 0x2, "9f39fbbf00bfef9a4e"}, {0x20, 0x0, 0x5, "e4194ab912dd0bd961c9edd29fd140"}], 0x10a0}, 0xffffffffffff8000}, {{&(0x7f00000021c0)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002240)="12d4", 0x2}, {&(0x7f0000002280)="a732432864058f12cba626f4653e07ea8ee3d72e9ab186bb78e56204805d3780d0adf6336cbad0822edfb30bdbe93e3409483ca613f20634768d80f2e08a057498614840f6b2e4b6b561ee8a6aacd0580f4e1a8839cf254e362058c73511050b3a47d649ca743920f21b628ff215d50128084f6234f25f606d0a3a06a9705e010926ed3e39a2fff154ab21c20bcce5adfc6d294bc18238e318e6aadb", 0x9c}, {&(0x7f0000002340)="ee60f33260cedaabfc2a07f17a9ab2b8e9b43ea928dec8e79ae5a8d1fbb17640d10d0240e1bfc876b9a136da49b8317ba87fd7bfe4687bbd07823af9a4ff13259710a610fb2f08a88774eb8e10b116baf358c14a55638632deebbcc98b155b6829e5540ce997400a822ea1d849e2827d5b9f95188dd6cf25e31fb348368b5529f860695d34be9d10a4e56d2cf846294642a44c", 0x93}, {&(0x7f0000002400)="14dc27023d1120b2c704b823b217952136023e8f53c337ffda2ed4bf1b1d71ff20b332803fcded549113cd5e32d9efb079c37ae4f4f5ae6b0bb8d059212ee9e351ee4d7c0ea6263d6842ad13754079430d9208f258d550ef3513ae09585d9403258b66f24f95fd64eb1b23848d2503fc1d31415775f366e752c49c2ab07ff185187a626e8c1c99e309acfa62231cc0bec2180b96b05e029d2fe3d7fda08bf92dab92daa03eba623df41d7f48f89c210caba217cf8aa4b43ec3855a9b2546f367b4d006", 0xc3}, {&(0x7f0000002500)="56547164c5d0319520ab5b02c924841f251db4c0c1d83a03e73000de9e50a91fbfbe9088f92f44e53b74e06e5edfdfb3", 0x30}], 0x5, &(0x7f00000025c0)=[{0xa0, 0x1, 0x20, "feb7e50a243420a36d3a593c9554ae16a884dd50198284ca217ac30004d3adc1916597195d77d506024481778f337fd9a733322b5c7ba1b0356173a036353b5f47f9750ca38b887e50559aa4b3d31d2c301982107c9c4bf6501c546b4a410896734ab5dbf5a9ab0f52995347e7db41c7e1d9ffa934432b719e155fd2216b6761af3c2978ed5effe300"}], 0xa0}, 0x1000}, {{&(0x7f0000002700)=@ll={0x11, 0xff, r4, 0x1, 0x38, 0x6, @dev={[], 0x2a}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000002780)="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", 0x1000}], 0x1, &(0x7f0000006c00)=ANY=[@ANYBLOB="d80000000000000005010000030000003a8177437cf62dc7250f2cf51016e342c24d1a9cdae656fef9eab0d40548c2e9eb3fd983b587f5917aef532abfc50ec56225ba3a3f6523df9e5d3cd9eebf9ff134b8ca66f1173040c384c8997a75d4e2fe586002bcc70e9ddee4612c755f9fb847438434ae0f2ba79bb2022df0fb16a96839be349a022ae12c28ba0851a57d06cb85e7b602a8a89344ae5fe76f270500f60acd3ba689e0daaacfd7c712d76b272d29fb0acc54007f026de345abd38eafacdf215efe1761c3b8fbe18ad8bcc68f9999de77d63639d77dd72a00"], 0xd8}, 0xffff}, {{&(0x7f00000038c0)=@l2={0x1f, 0xffff, {0x20, 0xff, 0x9, 0x5, 0x9, 0x4}, 0xffffffffffffff84, 0x400}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000003940)="0c90e507909c291421cc13820acc1dc47bfa99007f5b0ea7837a6a2b7cab62ec6d1563a32fcc4c1375c730ea81f6c49eb53dc144b500ea661deb910b2fef99a8ec1208276b19d7edbc2dea7c59b4d601b4e2c846a01a7aea2ec12db69d0b2be9ee2d7a3fd02676520908eabb24c2e4595a4dd6d6f2f653a1c95f62cd975ce8e7df7ccf03a16db1588d9a7fcf53dd94e62375f843fb543475513d2d7e4def6cb56fbc1ad962125b2e09a1c25398ff5f791fdbbd96e494fce05f1301f531bb0c5792a2d2736fea88530c330487ff9b58ce998e208a9c3769fe08b42327dacac3b1b006737569d34565ab4ba0496e4a5ee0754d3bb6", 0xf4}, {&(0x7f0000003a40)="85f943ff3e309273b2519ebef7f1ac075bf75e7f05d116b5d43c7168ef2b224e08bc24a118ba44059dc9f2ea6a63d90d18e50b2793c738b1bcadd197548d64a22b63e2c63702d7164108c3555af859f6b1eab28010c92890736561acd425b7bc93d879f425fed0f752f7e1aaed56cc0f8a9a032c757886f66bc271e3023562a166a634c8b0c9e924ad74fd90250acfd4b3c6849aa232ba3c86451c55bec3415fe510570071e7841d586beb0e72b9cf3633ceb23fe9465b8c4b99d0e98f3801cba2728ed67163c4a7fb2c2109ae91fa3d651a1e489bf75c9c39804caa2418ede352d8", 0xe2}, {&(0x7f0000003b40)="2fa82e9c7cf875", 0x7}, {&(0x7f0000003b80)="1a5d09d6f0cab0baa46e8087cd864cd5fa728e8b566c9d6eca614d5993e689a8d68e641aa2fd5591562cae332996b4b73ba0f4d5d5563c0bee32ac66860d47c86b01e0317c5e166e24b494f213e5bb64bacdc791014a97ee94530ac18437c03caed6604648028abad8a41fa8087e198680e4079c806ddf311d9d044b683d714fccdd5fecfcfef21c94734c91e12a4864739204052ea921da736480261412ce817616", 0xa2}], 0x4, &(0x7f0000003c80)=[{0x108, 0x1ff, 0x9e, "9f588fc991cc6328984d44c0d79b2e1c12fbd45a25bd85d23b3332ae8d33b965f5fb68ddf572447a781410bab5af54d5ab5c4afa33481d024803f8fca4e49b07c57debe0f8e0437bb64f504c91c94570ed58c43de5c48e5212753c71e5e6186b9b36553db91c6f142a9a603099a703041451dfef6cfce8e93d0af0777b858935a26510d4b862e9e8ce81a699813d0a48d4f95cd5f294da88c0cdf12244b0c774b504585628da1fd4bb07677cb800ca661967da6f95f6ce0aa145789e5ea3c1a71a5f857895fd6d2942dda0f92b20e1774386a2528395055a0e6d3a945fbf5788020105b643f8b95e6637fb4503567d589e"}], 0x108}, 0x7}, {{&(0x7f0000003dc0)=@ipx={0x4, 0x9, 0x40, "bdcf909e4090", 0x7f}, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000003e40)="40c98945226a78932f07950721d22b1d0f7cb4e520887b9cbd54682271e064ebdd07", 0x22}, {&(0x7f0000003e80)="451c5715fa0a730c13e458f59200d82803cb7998628c", 0x16}, {&(0x7f0000003ec0)="9b346789980b0e138df1af55c8edc9abc1031cfa3d21e8f5411b1ae61ddb", 0x1e}, {&(0x7f0000003f00)="466709e414299932644a7593eac342b314f7140b47b88171b9eba453ea010830549c693479a5bf866490e33cbe018c7d20315780365da2c45e0ed04aa5ce0910cd48a05b898db452b37259f16fd478de5f571b64342c0147343226c1bd5cdb0aeb2a1b5d6c7454b166c1d64d19ddde5d72c7b2c0947a815dcbc038ba7e5f1b2567ad4d50791cb7aabd2444eaa07730e47625a1e2ba503bde", 0x98}], 0x4}, 0x100000001}, {{&(0x7f0000004080)=@ll={0x11, 0x1, r5, 0x1, 0x5a5, 0x6, @remote}, 0x80, &(0x7f0000004740)=[{&(0x7f0000004100)="5c0d961069edee2fc25996cb93bbd7505e2d006ee4c6926e42d128bdb3a16c32e0c8421e4ff8026b37ba1c29b1eafe5cffd6dccce5aebc0dc2519d48ef6947d5572d70d07528fb800fe286b8160eddc1e01ef4cedf48863af5d2dde4f78ad016401703435d660dc1b0213ecaf9e874d052b985c53789cbd57d3c01fce6500c7243ccbda84388dccaaa07a0e3872680e273", 0x91}, {&(0x7f00000041c0)="275b55b886abd15e4175c649952654aba887d16ad48bd291153ef4d3f89c0305f592bcae96cfaaeed07338fa887fb1b7be32243f763c12d588f5443b6855b8f6d5b774243dacc5100c26b280c7e75a59aede9fcc616ca5ba8b964922a4cbd9a0eacaa29845345f7711de8f6aceb24e87e25311ce7390f848490ca81ef79409db13bf6a47ceeef28cad6552f88577a8a1e555736c6736df4ade7070fdd020587cbd6b9f230f5723751bd42bc7e645f8464579dec3a3c9726f73", 0xb9}, {&(0x7f0000004280)="8a3d4df84b12e64fe93153671c02ebe4ad3c343aeb375d814469dff1c94f8062171840070fd7fe6f4d0f415d652e4ffd685ec798532838219d6b05acbeea6c06b065b4b2e95ea3c3e885283b7bcd8d8ac6876455ec8ca6cb4c716e1412566cda54dcded51d617275bdbe8ddac16ada5d087241c28b59229feb54d1366cf0a58f7abfdd547b1d41f48a1c0a1ce6563de597f1e36c48892ace16ad813dee6c7ecee4fb145ca1e310c58e1ec981c477c0648010402e51518c79e55e123dd583a6422b632cd0", 0xc4}, {&(0x7f0000004380)="4988f1f0146db1b9f56e70b1c086d1e4af316f66", 0x14}, {&(0x7f00000043c0)="8bf4da40c7e47f0a9c808ca82d7726d7d25e3677e0023dde6d4de035e46cff2b9370dbd8", 0x24}, {&(0x7f0000004400)="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", 0xff}, {&(0x7f0000004500)="b3823fadf54a8f9662222a60aae010585dfdb07d19920651946adbfc617651810f989b0cab4d75ecd7c1bb4e906f74ea0dd632b706030333538183d5f5fb9f34528d4ddf54c6732b7194cd8b702625d4d9c4e4aa26018ec94a028119803cc133c9e4f9d55940353e3babddf5417bfcf40b057d1b1fb5", 0x76}, {&(0x7f0000004580)="c5325f2e133a9a7032d859eeb51233a38bde268ba18477cc0ae19a0fa1f37f144e11ea507f801bd07024657b5fd0f1ff3884aa98966e698e22e8fb1e191f8f09efd30ec41d56e70ba3df3a71489a16532b4346a08fe2adec771ac6b9d3569df8ed9e31960943fd76a790b7adcf489784142d93af10a3c90bcede346edec7f2894ef0913b", 0x84}, {&(0x7f0000004640)="641bb5b32830cfd37a866b3e691d59595b11957d8378f0d1c1c54ffb4457f45ae04feec5eaca4cfcc0051b9c82325b01b27ffebe7dcfd86ac618899fce9b0bf477b604a9deddd56269ca628612d369ec158772b9de805ae3074a5c5a8bfa10938b0d946a095a9e649b6a503900ba7e6add49e2e0f84d928050e957f7f6bf209c47792d10ae55388070ddfcc15f3f5671c3da6bcaa152406207e8b68b6e9cd77fe907bed6af1461b8b335833bc5345f33c03ead62afd4ee3f9aba8ec8480b5c0a08b8784e9a0086cc81620e0f4aee40797e072c66fda783c72ee163bc92f7be8289d9c9d24d", 0xe5}], 0x9, &(0x7f0000004800)=[{0xb8, 0x6, 0xff, "23f91408f9b7d8c0375b4d525543f3daa1e72393dbe6c2f5ac75ada7b836c4cb9473e17b88d4fe9ba0ff771d7da2eb5e782e91f61f929de03afe4d437fe07c1767cf9db76e46e76ca2157d287c5da9fe7007a1742b46fcb20062ed7109e0aa19bdb84dd84b8c79e22d53f3491c6f543568046e16bd0632aa063a9c536e903c8badfc10ab33cf7667b1b0513b8d0378568d2d6d3a6a410c37e7666aaa2e7379313313b1888b01"}, {0xd0, 0x113, 0x20, "91147db2f6d57326b19470b043ceb1e4d73eddabbb354f037887682817b91307a3e5132aea78b0cf434400681085d49804b9460a92b4c13d238488b0ab56611a1c10da26520c08ef5d176e8a8d6a73d87441b24c8d0b1ba53d8f09c19f1e062283ca0608313b8258cdcab7e0782beef9bb07b39dcabad0bac9cb95b25c16ff3cdd0df7ceb418443c30e2250af4bdb2174b852fee0c31cf7643424aba277133c43717343b82747a1bb2b946334b3cdd6d4fcf93fd7a368dee5a36d2d624965e"}, {0x18, 0x18f, 0x6, "d2b8e1f4"}, {0x108, 0x0, 0x1, "34be7e017578480c6b38ea13e9e40b52ee0d0136d35d06d80082cbac0582725e22e477230f11e913f256647ac5c526eb893071ca983fecf885fc532fff21c227fbbed738bb3e76a379160c6e4fbef6f24571f99a0b5435656413426fa68f64e147e13e9582ed3c3ab7e88f76217c79f64c8b1621026c5d72e20e0898778b349658914b4023ecd5f966821147e0d99cc2caff4c81b6f77109a0c3c004cb632ad5bf99f17a89fa42d33400d9c91aa80a4414ba887cfce461d525b018d4d733ee64aee4be8fff4a83c5291f61f0dd653571445bce942dd94011ec1442acd669040e892726ddc490e3aa7ac070e2039c02ef099bf02bd122"}, {0x18, 0x11d, 0xf99, 'I'}, {0xe8, 0x0, 0x100000001, "b0d6e6d0122fb75352a48d29660c87b0970b713d75d1321efd35cb0ff3f47b3fccfd35db5ce935a06b3891cdb80f425bde65d9ce0656a9feb7a75a699b7431b837498535cbeaa972f07dbe1fa1fa84f5bdc787c7798f9fa7704b29d6103a9254c11371a83376c83bab9a81331ff121f55d44d6b317ea0f69b7822f4a0cfbe5da2643301862ca81b59cd114bf6842c5d9831353249c0a9cf419738f48106393e6456d897e43404d66e9c116ec9f31bbf06b1ca2990dbf872732b90731efa278f11957960340fccf53353a062d6c6ef6106361f017f7e0"}], 0x3a8}, 0x6}, {{&(0x7f0000004bc0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004c40)="ce31b54c1f9a2d09df1a37c40e96aac899e9731fac43a4c88679c5200444dad36d875cd648e39a1de8476b3ac7cdc03fe2ad40d3ec7578c10d09cfac548b232646c5caa0d62a3e22637d3c07982384dc7b05b47060b01ebac3462d2c53e496b99891a8f03738bffe7ed855e15d0367a22af3e991f6f49be4cd518f22731c50ac496f5c76cce522829147681e9f2560475a0b7a526628dd169f0f6f0cbde781510d34f7a3b25ffe6f8e054498", 0xac}, {&(0x7f0000004d00)="d3b55a8736d31e1fa859016eb03689191fadf1ab7524daf077bb7df735f65fe293", 0x21}, {&(0x7f0000004d40)="46068d1e0ff67fa29630ca31936686fb0a3c5a7b83d93a6252647c1ae0ca2e38f65ce418e78901810b022c63fea476e07f782f9f19dba078814ffeabd3b6124670d49c97116ab43fe8dce26edeb6fd9857dd3c43ee4c4ca2e582f4223f09deccb7a4dc11745df933807c73a32a44f13767f9ca3a09a4b8838f1d378ebf29", 0x7e}, {&(0x7f0000004dc0)="9101fc608b73738e7530db4845a5f546fddcb16892d719a290e30fd25b476859c61d09d12d352ba886ea2cceafb1a4809c683210b600708d583f2b44a1c5ae297401c17f6cc6e7d45631f219569d6658b840f7e36c480e26b317501cc53fed2fed3794ca5937", 0x66}, {&(0x7f0000004e40)="7f2ac2ce395045fe5ae59837f9a9defb60602a5a3f45", 0x16}], 0x5, &(0x7f0000004f00)=[{0xa8, 0x10a, 0x2, "0285888bdc8add4036fa06e85a1960153d8f4b60224e6c72dd4e5bf0fe23793b83229008bc09b008b4f125f59a7e92757362385d25ec02aee25a2806614266eb4b057102b28c7735a4d0f2dc72a2e4145d812fefb2af743f84ea1c9fd71f89228faeffef2f1994f30954a63c5b1717ed444b2978ed7d1963064c252db82047e45cf1de81ee00be0adb7ac337812520f97432b8"}, {0xf8, 0x115, 0x7fffffff, "6ab77d59b71db03c613bf119996ff275472a0f7bf08590f615293f1986acc5187c6571096c658453b22424fca9ce7ff8db0e6e1f0b0dc609d6fbba2a9a75620b49d0e9ae6e2f2468ac3512a2af19d6387d2254b6b7ca4739993fb3eac71c1cfb4c0da99ab6b61252ab19156a57a259c730bfed0dffdaf20568f3df466912a5419bb1227286ef12814cdb00e392f3b109454cf0deaac6dbda285962b660d52c2398b222640dae8100dc7a6a5f515dfcc125fa51e083b7093faa872b2473880d3dd3777ae37c392c0c2af719bf4c6e03543a69edbde7f54b13317c7c0ad5b13e887a1692ba2ca8f1"}, {0x1010, 0x10d, 0x0, "cb1b9a6f384e568a98cf7490baac136393feaf72cb0fa2decd8ff284843c7a1209aac15c256ec28d4ed698eb4d19ec6618716e00b3577e5a301ecef79d16cafda63c8ea7d9d2f6865013b0976f3744b0d324541314510ba3ba3f8d92443d05461b1b2b3017c7f641717e6348cd57a0c1644bd1065a3767af6baaf6b35b54755b2790ae6e48df2b13132a85dc522cf98aba49158a73589232fc4c60285490c5bd91b877615fb6dc4a161735385cc70a3133081a2a2eefc536c0c1915b5f3fd18c83c30c62aa7a3618840069ee18f42e7454277fd96c6042e77fe181310dcda26d521107c6449f87997f084674af4b927c8fbd8c7dc6a3fffc1ce66ea2007030d1fdee78cb175295f4cbff8c68ad26e9e3a117200c72eadacdc03da0666d2c4ef877f180df617dbe161d527a0e235c5c03359859c04b54885780572b3e27a93104545dbd9878a0d598be376af325563711e1022e6d29c7d3b5902c8e74cef15d64a948560cd8b6dbac49f220e58a622470fe9874e34ec804577d6397fdb7c0cde8eb74c7c18bea2e7cd9aac47c60206df1c1989a1ad4cd33dd3837262eaad124d599296920983a61692eb776fa9db69b0f8e7a66e591831e898029b9e45233ff875387bed1f475285f7574ac58787c3a1d992d5dc318bccde131996bc09171bc5e3342357eb35e65aada5e27ea44b20e3d1f75838eb65721d47580ecd9686154d7c8809b3644a27e27567f9cce782c93c8831f5286799952726f355edec6a9e70eddf3f7a4c47c298554ec6114ef7b6a2270f2d4fd198d8ae90e3611c77d26b0966d225640b69768b9d4fd6200f06631ac1ae618e9406abdf1cafddd2f9aa20c032c7c7266bc7f526c8505bd4820e255f06359ba211c7b94a83c3b76a42205742e1bbff599521155522d154fe417a427e65a5a747a190a455f9ba8a262932a1d132d504073eccb5483f1e8ce9666ef82f8f9ed3c7d71a3dd1ca8bb4aba37a3fdb62abaab7ead87c59007e471873cf3f464d3258d19095c2594096c2807adedd861ad479ca6a244d0e00cb776bded8bfc77a849cca9d7469162f63b877b7b09709ff596d6e34493a237ecaab849a0729287dfe3aaca2509d83fe9e7dafc0d49b8178c9082fd01afb1d672d82477d3f41e3b365ccc64040763a967d61e6ee192e8bc3377b9199ca12709f254abc1120fa23f53f99f1de3b593859f42a0627120372f9a93b22f3bd65e89f057658a558386ae1a4d89e451964d13a9256c2a756fdacde1e3381c9fdb92b2fbb74a9a007e09a9c7748040eeda68d6aa5954768e48a87b4317f2ed1beea20496069bc7b8ca3cff165cbe693bc080e4b07f5c9d87c3532b4050fa15334c50260fc9a0d51d5b14fb4f9f9dfa46b1df42f39fe1294809dbe0d89ae7180437d9ff3fcee889281bdf9afa48627174d621081832e6218f126096a0116965e339b0bf196d3524321618ff1a5c7b6766621c2260a58e0b7c9ffae60f9eb59f3f4d684eb39540537848675244e9539bb9ce91e370dd99b5e98f52527e6cdb80c36ab23e088ec16221efcf0731b7057070bd769c89de2d132267e76bc0ee2fe3bf62dde9043c11198e04e8bb4fed192bc98e48cdbe4f362c343d9263a112f14d607b1ca2ff0b395ca5df914bbfb6e052aa29c4a1e90c7ec7c0b11476cc1db436d757933cd40c5a44dcc0f5c3625b003357d8e06c017436366ac4cd697b88c27ae98e2c06ea6dc77d80ddb4b785fa721691c7f58d62866ec2da928a2fba4439f00b9b040d584284f8cd6ff0353a4c150122499674a7e1307cb4462e0dea3abb4e3cc85a12f0e6c94c10110a5a83dd8edb09c156597b63286cc82fcd43b9c6da29ef2cf22407d22dcbfe7004cd0c9db7befc65e272badb9dee4150aa1499e190f6df8aaf9e9ae79b8640e506fb9b4b15b3c654cca9798f093c6c928fc59e089a4a0312f562464227ce86b5efc64e6bb854ed97a1c6d1df381f62471c754cd1ea1bdb7b64baa5e3c709205379c8c06d76f655c42483781d7a1bee8e9cc5c279d07df3d132b6f694cd90d663f1676f6b3a98ec6bdc337f746ecb6514ef8f56148b3c09b562d1c467fe8bb9f073e8b7046d141136a1d52b57973dec5aaa969abe1611f1237af144ac206f40e33b51a43a8427ca7372af66adb9124175eb334d2d3930f0c54d2d7b43a9e847f0454569a8a3f70fbdad0a914d845110633d4baa7df2c22859e865221b3845c8dc2b1ce257c021dbce6fe6c3e8fb75d4d951dc68f3b6bbf6d5652140a365c50920eaa45dfb5204cd0092c7d080082b98a17ca70d05b0f9ed7714e617aeb43c528591aa22197001ac20355508d54da36d809bfe64040af8a256e6555c1132b067c999615f9f6ca4e96c5ed5983f98b09973a5f7359cee396008022c12397f9b0abe96ce7cc8e9403a696dbc9524a8f0f8beceb1569f4ff9fbc955e06f908dfdd04dd03f7c703f54ca51832021fb9433c94b5414faa852ce8f2dd9a1e165b33d1d7ea56a4d7b10c03bb6c463fdc274e020555a086e58715c7e5eb046bbc0f196d236384d8f4e609109d1324fa1b17913ad145ac1ce2b238d853bc3977759ca042ec51bc3461d94838a1ee64beb90de13d7520be6601b47cbbde0dbc82947e1c9e5c50f8b297df5d9058d4a0c02711f190c382dd5de194a8fcd271383ae9acd183da3fcff849ce1babb43d0904a3f1b7c6c1fc84b70fc435f2e9f443c2835a04b14724ea79b1cc3075e84c9a031f9ff730111de3342ef954b2e990af8bc34c5d996a06f41424a4fb48e2cb17bbc1b75ec2e9a8334d71712ed532fccb3febcf22ea5e7841d1c0ff33d919c9026bfa7aff044ecc31c10678b1acf2f0c2904e804b48642141482709ea892b3b151be5b81a1cbba4468e31df804926e6cbaf7cb534b4311bcca73a9f15ec75a912fbb2a8b56abc2c68f621a8a69476ba3f6b7a03d330321fc11c53b3f34c32711efef0f97b75fd95bb5815d2f85a7040f2bf70cff1ff713a3b021e543123f2f8f4175e359233ed0f85cb863ade59e53bac550ac5a660a527d967e8210594c7a32a5d132ecdd7c7aeea67d775e0913a4a9f3ab8285e358973caba3301e1e2d9d86072523ab7525654eb69b51d7b9dcc3a50a4396bf0993ecb63b2f94f4624cc160db78c55f5e7b12477c46f3443c2ca313c92a7058c871c044a54e4719bf0d8885d4884b6060af41e5e9212708969477f2ec38f15817bade4d22bc7d0b75872e05a4689d989e272c3949b070aaffb094e0c38b3ef78b606288c130cd5d336eff2a02dea0bb4b0912c21369c3a3ec271d3b01bf49275ba47b0142ffa26f55baca8cc4f24bd3067e5836f7ba1809cf629cc8f255a24db4360543a931921d6a3b6c680ded6bed2074521b11089241c270f0764a0167792b5a771e88aa19f4b6b6d0a35b77cabf087b64134cc2a10f95951012aafe9c371aa3973e34c411fae928faef94838a965d35647d9dc6ebfcdbfe0965b04e07ec903a35f17833902add4727d0a87b63afcc41c0c195557a23c18a5f440e7645dd9c017711cb1828ad007ffc335d0945ecc4e8390bb5a291a6475f51c5ad0a299775d2fde98106e42e661a5d1823e6376559299912901151c83a0e9226c1d92e762f3e966d7c940025392c62109ddf012a2526e3965fd843bab1633ab228bfd1ce61328d2fdf235d013489b843faa86f396c48689811aa8bbd3f84c6f490adf6005a48936cb86859c09b8313ee864ed644196e7a6d27c62a96b0d8a82760d941b63131311c8fbbfaf0091c011f31748dbe24ed200781a335823c2159c75bfbb4fdc3297876d98701d6d3bda60001ba965397f3ff4dbf91f397a2ee3726e7a183a98d71d8149e820afd3b0b8e4adb93a82a2b613391aadbe176c93002ed2154d6cab91ebf57401865d4703cbc04164162235a17f01e8f437732c1a428efdfe08e28455b24e4afe5c0b0d4e5e658ebd1b59ebdda20b384d3de9e0b2ac0675bb9a541f945dfd5412406b414fb6f6e9e86388df2418513b46fd93c52dd3f2b3a0d37ca9be66b89e5a7f103c73ae90f3b741f317da2187751062bf395ac7ba47bec0186f44a968a548fb500446d896b5c2d4695288682dc1d291258703063d77ac54562a47bf73b9ef4245e05af03aa0600948cbf43f44485535ee718265803df7a9be863a0ef630623128a3c06ae1eb9a7cfbb7b1b5f6f30f191d13870859956a4074a899c37a87e52af5ed20e564513528ea31ddf8dea1d31c4cc6d2b81d84c420cd484a380bb3cc3d0972c99d45e64eb14de451e310b19e228fb69814f6703b2797dc7f25525e2a03e615abc93bd736976ec5eaad9c2ab9be29cafdd4b96a7f2be46d9f2cc99e715febbe533fb69e3bf687182ba07742abc48c83f74407de5e464d58e6953512cdc1cd9bc4e109c347ffafcb2d5f2202c764e396219009719650c94037a8b9a7d3635920df2c49e8bb3525aaf8d5c269ca657ef0fd7934b448ba475d3bff3fe711d4f4c84d24001b77bef6b8988125713e2afd5c23f622b69d7cef6bf4d73d367e3549370d16a52ab4eb40831cb39010d91e0520f02fa3ecbb0a729040f8818d789b12d544c5e0ce72de920b9040a5f6ea9e95f377b35b61e5409bfd44ffc1da61721cee96f4bb34dd90031c2a5aa015e71450cb986602f5a19e8d708be940b931bb8fbb8108151219a051071c63f15b6d637e04f92e27a5ff613035e37be7745b6981da83d2826294f1deaa80c847674c88bc7ece8201cbeb989228f4211488d8f90b804fb7956bf4707bfec7f87e294a40ede7de53ef07cc3a84058d7baa106ed27221e4871eb69ce03c96f242e106e5bd441bdce59205830f44ba08e629e4aa25a6ceb7e4632d27d1896b659d2a76d4a5aa129c4fd7a0fef458b51f411f7fe05e57710ab4f9d9f89084c98d8c5c4da93d6ea40ec76e53fadd5a852c7558e90c39225bf986e576c1145cfaf86eba642eae1225db824d8d22c8f8d9bb13fa9539207ee0e3a253bb6b3e1c902c893827105ff3af441722a2de9c263d2b108b12571fc821367a419d629d564f3672ec5fc25ecf16b3ea9d7f528e48faca86fbe6766350aefa5d7f5cded9931e3eb21dca8098206492a1674683623a28d28c8c03a4560b861c0468507d297ce40c14e2a2ab58afa3954637d0838c5cfb142a46a83d305689a10a3b25af3af06ea3199663ce889d60069de19de2714ddbc3bbd15256d17ba74b8373cdfc1a27705a7038c5a936a9ae12bfc2b173752a70009abfe838a2316f0396032f909ebf86043143d6e4c3e489010436803ab1e0bc7247242fa1025e4dc048b019991078435afedf134e7b2a1fd53e4b2e21087188fa3845dc4913766f59db9db54c1981915ae08538b0368c92e71668f1385a9a017769cfb65c6986f0b5e941e79e1f1f32e0cb2154306c30b850ea670c97e53d9737b80054fae52403dca4a9004de499e93b707dd6850c66c85255bf64ad7ac6e80df09c8f4cad76c7694dd634e6868e547382a26327f52193ec1f0a09ff0aaa08dd5cce246e3b1430abba584170e483695f1575b41bab354fb7c8b02a86df60e3da9a9de1cd5063214298f0868fb11bce940b232ddb13403a295d5f6f668e432ba17ef911beb4b6f955a82bb731ff63f2688ec40a29269a1fc2f2addf5a24a43cf1ae51b2a956f5d9001fbac3606758e30f534e09ecf51e2b23625e3318ddca713974d38938f549e1f4386b62ffaa73d71614af2a71e32602af317c8ca9a4cea0d27a50658717a78757d0f06191bd14278dc3a768f"}], 0x11b0}, 0x2}, {{&(0x7f00000060c0)=@ax25={{0x3, @null, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x80, &(0x7f0000006440)=[{&(0x7f0000006140)="31d1aff861a31dbd946ce54fd3605b706f3fd5a7ab6011a92ba1af3714617acdf305ccaee9bf0a4c10cc3b974fe950982f016581e3dbc7ca74549d07bb9bc90732d41c81b3939aadfc9ef5df04afbec176c5a2f9d37258f0429edaf95f8551e89fdc4f5c2a9ef83f8c9e9fe5b101ec783d6a95c4e81bddc88e3724f408421a46a6e585c3f9d88af438eea781caf26f13a7fb03b29fe184d0a4a8347569802203b46c70c66f1bd9d44be331caed0b5a4db689c69bea7304a5d405e24f1723a8cbfe2935c91c6f9ded82a1a7471d60ce7dcb35239a8b2511d2b692ad2e2265135397b90a89b9e512b238279966eb1f3586", 0xf0}, {&(0x7f0000006240)="dde783dd65d3d3bff3a875cf2a8b7629d688a548230927dda6e4bce6532797c64db13df8de55ae82935726eb5fd9396d460e3b749752ccb825d30fc7406563112a420839ec3d04fb4749652c565b3a86732853a4461d4ec71988c1ea785a7311e7cc439879f69a32ace7e2180f87e34bc755c9bd309cb11fba03277a1cc00b52e4398dec61a772e5d710d8346c", 0x8d}, {&(0x7f0000006300)="57b589bbcd722ec4fac0ea88fdf7e9ef41697def993d6f8399d825342ac6fcf6803da28af1c7b2e6dd1e489df709e68099567883d5e608cd727c20e90b82ba2b5b70e0696d8906bff93fa83f94176ebf904cd8e3bce4c1c82f335d0361e66d3152c4691ab31cfa62c8133d90a8c2f44a0c84651c1927c6578e9accbe04d897d1c303cab56a417be75641e0095e7f29966d5d3ed543ca47993ff1d764048688c2b9647907922b40bb", 0xa8}, {&(0x7f00000063c0)="7e5dd952aeeb5514548f68954495604a9f02f03fbe936e16d4887681bf7fe28c3e0182dede7ad93ad6b39420ad263b4ab11b490a6b738be9002ce5dbea050d4353874f5c8bf6286772e9d14ce9331c7df56d218cb93ca343dafd2de20935", 0x5e}], 0x4, &(0x7f0000006480)=[{0x40, 0x104, 0x0, "2110367f958af2bad1146ba3d4042bec38334e884997e7aaef69f6c9f39692cd90a2ac466370313cd45942aa384fb710"}, {0xb8, 0x13b, 0x520415c7, "aefbc73b59eee5799d32b869d6cc1baa8b429222a270ab5cea1fd1334839bf5c506fcc493540441433bbb9275e3a67fd5990459af519748e9e33bc370770897023cbff7ae9ac0888b5f3b2ddfa2c57e5718eb69fc0543039a9224dde764bbd24d96ede0f4cb21616e4db67d067c68cb601fb2fb596d153227e1da6164b7ba75c357467f5b1b6c978acb56620225de0db72c692e3219ed9b210571db083c856da676e422b"}], 0xf8}, 0x7037}, {{&(0x7f0000006580)=@ipx={0x4, 0x7f, 0x6b87, "292a539bedb6", 0x1}, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006600)="29be4080024d2de3fc37e66c7d21866adf356a61a76e8e3a304b93b0c62f7eaf5caf6ede8cf148273d7c3825b05f82595dfd57a7d5637f1f6f349d321b1b2669a8bbb2c357e6cf69de9b3658700a8a2e241bb856cd37a7536a5d74bd3a0171432e8d14e62d4a2b95cc1232ab34206fcacb0d6583019c2ebafaa49ca174f9902f1d0aa7b97ec47648453f8ac0b71018ada0c214a2213b9d6bfce6b7f82a68b787a1811b9ff4750a60f060cded80ed530e9096fb739ba9ebf4412070cbb6bc23438bb547fe1036f30e1912a5f565282774b1b7694726256175c9bc97b815f4969611a7a1aa567b7e70a8", 0xe9}, {&(0x7f0000006700)="2c675afa1fd307e2e6ae9a8fc525121965a699c1a80ddfd9ef38ab7c6f7d3cb68b57912b106509f29b4c5799578721e79963fd7170ec78bde8f6cb193159b20599987c67e3792d634bad7d0263e0c01222dd428c8f1e5dc80a439358aba2b1f0623d2c5ce83e46a57e28fa3b0cb29f6144a83dd9b66eb29f01bca09d1d5df4068acba31e8a92", 0x86}], 0x2, &(0x7f0000006800)=[{0x50, 0x29, 0x58844b7c, "76feab77b5adce72f2469819a78bf75864969ff761a801ae1657dc629c5a40c365854d7e26bd3d2f2ff0b787b92753eab75ce409a8c61a17bf08547d46e4"}, {0x38, 0x0, 0xfff, "e15527e0ee43059ff40699ebe7c1f60dd24c4b99b62b5078be7760cf84c3a832e3753acd047421"}, {0x70, 0x118, 0x6, "7313e269562ad46ad836082db735dc718dc0c2db0e289dbe96a367e461e38fa09a9666c958bdf386a8cc4e5caeb6070aea3e74cb6cb39ce61beaa9b36fb363f6b1cb4f21ee24265cebbe1ce034ffa8bef02a25066cdf2a0b1495a837375a8c79"}, {0x20, 0x111, 0xfa5, "f673f31e1c83cb131d0f21cf"}], 0x118}, 0x6}], 0xa, 0x4000000) r6 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0)=@assoc_value={0x0}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000006bc0)=@assoc_value={r7, 0x3a7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x9, 0xffffffffffff7fff, 0x8000, 0x3ff, 0xc1b, 0xc000, 0x3, 0x1, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000540)={r8, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x10000000007, 0x401, 0x401, 0x10006, 0x6}, &(0x7f0000000180)=0xffffffffffffffeb) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000640)={r9, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'gretap0\x00', r10}) 09:24:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 665.114750] protocol 88fb is buggy, dev hsr_slave_0 [ 665.119881] protocol 88fb is buggy, dev hsr_slave_1 [ 665.125048] protocol 88fb is buggy, dev hsr_slave_0 [ 665.130116] protocol 88fb is buggy, dev hsr_slave_1 09:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x563}, 0x28) [ 665.194731] protocol 88fb is buggy, dev hsr_slave_0 [ 665.199894] protocol 88fb is buggy, dev hsr_slave_1 09:24:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 665.482646] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_xlave_0\x00?', 0x2000000c0ffffff}) 09:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x564}, 0x28) [ 665.649817] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.656325] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:49 executing program 1: r0 = socket(0x10, 0x80005, 0x1) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x565}, 0x28) 09:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x7000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 666.033823] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.045731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 666.059193] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.065622] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x566}, 0x28) 09:24:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_s\nave_0\x00?', 0x2000000c0ffffff}) 09:24:50 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bpq0\x00', 0x1000}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x300, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000100000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000d6000000000d00000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff000000"]}, 0x3a8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$inet6(0xa, 0x20000000000800, 0x0) r7 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000008c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000a00)=0xe8) r12 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000c40)='bpq0\x00', 0xffffffffffffffff}, 0x30) r14 = getuid() r15 = getgid() r16 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000e00)={0x0, 0x0, 0x0}, &(0x7f0000000e40)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000e80)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001000)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001040)={0x0, 0x0, 0x0}, &(0x7f0000001080)=0xc) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000010c0)=0x0) r23 = getuid() r24 = getgid() r25 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)="5b6760ea2218264940c22b08429a58aca65a11c12396c3e6af", 0x19}, {&(0x7f0000000180)="fb4d41", 0x3}, {&(0x7f00000001c0)="974204ccf20c37ba241b5a954945637e94dab880803d830a88dfb750daa9292b9bb6a853b1715e79fc5cbc38b46f8bc1ab8a4def8bca9122b96af18ef48242c7935d074b8e1a6b8f8e4f9ae377aa6df2e2994c309f40472f28991bef5d92eeee0fb878369548557ab3aef5e54a7fde7a3a367e9ccf22925068b85a0467c4b2b4b593b2b681714d575d805e151a24e3e03ea393267ec039fddec5401720d309fb9a6b59e4045416593deda5f27191e66879adba5f", 0xb4}], 0x3, &(0x7f0000000a40)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x40, 0x20000000}, {&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000b00)="f01ff0a3c96103495c8c214d81f775a09684d5e71ad918e96e337f9bb572f6f8aabb2ecdff99c62bddce4008bee871e435944dd74147ef6d1d6011ff1d1843bc5068fe82a8abe72f7b9ffdcbee81b195174deb3de6610d2b6a57a44b7fbc9ed47d3337b31a849a8ca61e59c3f57138d2b9f77318fdcd765a681be7c605fab740363317108135e9b0eebbe8055d82afec097f2b2194b691e66a332b6dd77fa7ba3cfed405ee46120b03fa019c62e3a52acb332c811c1f4ae9a684ad463d374a96ed47bd21dfc9d8691c016ffa7c631e1a6010beef70d275477d9739a93564f67b689a5c3185604736e7892bf3", 0xec}], 0x1, &(0x7f0000001100)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @rights={0x30, 0x1, 0x1, [r2, r6, r4, r25, r3, r0, r6]}], 0xb0, 0x4008000}, {&(0x7f00000011c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000001240)="645baff745f408deaf3ba1e0d68c604fa0f31ee611294316393546f9e38b70dbbd122698eb8cac510c4ddce3d719fb38c7f2e5007b5f0508c8b62507ed6dd431f56d3279917448e723b5ca8fc6cc634a8369420e207789a44b66f2abc1668d4ce4c7a435a7eaaf6bfcbfd4e02697505d8389bd743054f6ca8a46e6b77b1117d6ccb29d7b64d79c93408994e4fbc4818e843fcd6db19763320332eb25059dc2093ae5aa93413a488068c238af1e8755ece294445e4ad14c3a608b676ee174dee70e43779cc961e2ec88e25151fa1482150a9fc705f0e966a87b1f6c4258d1b2a3e2", 0xe1}, {&(0x7f0000001340)="7b83268bb60eeaf441b1580d91ac48b1ab2d3b24fc2eb7abdc", 0x19}], 0x2, &(0x7f00000013c0)=[@rights={0x10}], 0x10, 0x800}], 0x3, 0x8044) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000640)={r26, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8060000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 666.504404] x_tables: eb_tables: redirect.0 target: invalid size 8 (kernel) != (user) 1 09:24:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x567}, 0x28) [ 666.649639] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.665974] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.672367] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x9000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 666.714729] protocol 88fb is buggy, dev hsr_slave_0 [ 666.719918] protocol 88fb is buggy, dev hsr_slave_1 [ 666.747887] x_tables: eb_tables: redirect.0 target: invalid size 8 (kernel) != (user) 1 09:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xb000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 667.033500] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.042340] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.048764] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x568}, 0x28) 09:24:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_s.ave_0\x00?', 0x2000000c0ffffff}) 09:24:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:51 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e24, @remote}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x569}, 0x28) [ 667.586682] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.596154] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.602551] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x11000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56a}, 0x28) 09:24:51 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 668.098633] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.108353] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.114879] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6ef9d17a, 0x3, 0x0, 0x7}]}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 09:24:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56b}, 0x28) 09:24:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_sLave_0\x00?', 0x2000000c0ffffff}) 09:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x14000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:52 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56c}, 0x28) 09:24:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000500)=0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14, 0x800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x2, 0x1, 0x6, 0xb, 0x7, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_address={0x5, 0x0, 0xff, 0x20, 0x0, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x8}}]}, 0x38}}, 0x44054) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000840)={r3, 0x1, 0x6, @remote}, 0x276) ioctl$FICLONE(r2, 0x40049409, r0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000900)=[@in={0x2, 0x4e24, @rand_addr=0x20}, @in6={0xa, 0x4e22, 0x9, @loopback, 0x81}, @in6={0xa, 0x4e23, 0x2, @remote}, @in6={0xa, 0x4e20, 0x10000, @dev={0xfe, 0x80, [], 0x26}, 0x200}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0xea, @remote}], 0xa0) socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6(0xa, 0x20000000000800, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x40000000000, 0x2, [0x2, 0x8001]}, &(0x7f0000000440)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000780)={r7, 0x80000000, 0x48, "1b5102a68881e9fdfde84280a7e8956bfd4376d31e94fae8e8dedfc03c8bc4e595e5c0a5de7c425f917bf0bf7bfe34927c6566405a5ef820c3975ba82da41a9f2bca2b99c20a6f75"}, 0x50) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000004c0)={0x1, 0x15b9, 0x3, 0x6, 0x9d, 0x4000}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80e6000}, 0xc, &(0x7f0000000480)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x20, 0x70bd25, 0x25dfdbfb, {0x0, r9, {0xfff3, 0x9}, {0x5, 0xfff3}, {0x0, 0xfffd}}, ["", "", "", "", "", "", "", ""]}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000009c0)={r7, @in6={{0xa, 0x4e22, 0x6, @empty, 0xfffffffffffff142}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000640)={r8, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:52 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 668.693454] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.706636] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.713141] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x21000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56d}, 0x28) 09:24:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0xa, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4}, 0x44000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='veth0_to_bridge\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x3b, @local, 0x4e23, 0x2, 'wlc\x00', 0x0, 0x6ab, 0x14}, 0x2c) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x63, 0x2) [ 669.036954] IPVS: set_ctl: invalid protocol: 59 172.20.20.170:20003 09:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56e}, 0x28) [ 669.092847] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.100675] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.107101] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_suave_0\x00?', 0x2000000c0ffffff}) 09:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x29000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 669.155214] IPVS: set_ctl: invalid protocol: 59 172.20.20.170:20003 09:24:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:53 executing program 1: r0 = socket(0x800000000000c, 0xa, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000180)={'syzkaller0\x00', 0x800}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_buf(r2, 0x0, 0x3f, &(0x7f0000000200)=""/26, &(0x7f0000000240)=0x1a) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'veth0\x00', 0x8001}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000140)=r5) 09:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x56f}, 0x28) 09:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2b000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 669.654416] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.666538] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.672962] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x570}, 0x28) 09:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2c000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 670.003225] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.012858] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.019307] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2f000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_sl\nve_0\x00?', 0x2000000c0ffffff}) 09:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x571}, 0x28) 09:24:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:54 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @loopback}, &(0x7f0000000040)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x32000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:54 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x572}, 0x28) [ 670.520634] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.542112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 670.553011] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.559445] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x33000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:54 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$inet(0x15, 0x400000080005, 0x0) connect$inet(r1, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000000300)=""/220, &(0x7f0000000140)=0x2) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x100, {0x3, 0x0, 0x5, 0x7ff, 0x9, 0x2}, 0x2, 0xff}, 0xe) 09:24:54 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 670.874724] net_ratelimit: 6 callbacks suppressed [ 670.874733] protocol 88fb is buggy, dev hsr_slave_0 [ 670.884733] protocol 88fb is buggy, dev hsr_slave_1 09:24:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 670.931038] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:54 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_sla\ne_0\x00?', 0x2000000c0ffffff}) 09:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3a000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x573}, 0x28) 09:24:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009, 0x10}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r4}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r5, &(0x7f0000eed000), &(0x7f0000b88000)="03"}, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) accept(r1, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) [ 671.113030] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.119546] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x574}, 0x28) 09:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3c000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:55 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 671.274752] protocol 88fb is buggy, dev hsr_slave_0 [ 671.279904] protocol 88fb is buggy, dev hsr_slave_1 [ 671.354744] protocol 88fb is buggy, dev hsr_slave_0 [ 671.359925] protocol 88fb is buggy, dev hsr_slave_1 [ 671.365119] protocol 88fb is buggy, dev hsr_slave_0 [ 671.370242] protocol 88fb is buggy, dev hsr_slave_1 [ 671.434756] protocol 88fb is buggy, dev hsr_slave_0 [ 671.439882] protocol 88fb is buggy, dev hsr_slave_1 09:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x40000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 671.541971] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.549994] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.556430] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x575}, 0x28) 09:24:55 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_sla%e_0\x00?', 0x2000000c0ffffff}) 09:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x43050000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x576}, 0x28) 09:24:55 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 672.093001] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.102791] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.109351] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x577}, 0x28) 09:24:56 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6c000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) r7 = getuid() r8 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c40)={0x0, r0, 0x0, 0x8, &(0x7f0000000c00)='em1eth0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000c80)={0x0, 0x0}, &(0x7f0000000cc0)=0xc) r11 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000d00)=0x0) r13 = getuid() r14 = getgid() ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000d40)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000d80)={0x0, 0x0}, &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000e00)={0x0, 0x0, 0x0}, &(0x7f0000000e40)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001200)={0x0, r4, 0x0, 0x10, &(0x7f00000011c0)='bridge_slave_0\x00\x04'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001240)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001340)=0xe8) r20 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001740)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001780)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0, 0x0}, &(0x7f0000001900)=0xc) r24 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001940)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000001a40)=0xe8) r26 = getgid() r27 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001b80)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003f80)={0x0}, &(0x7f0000003fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004000)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000004100)=0xe8) r32 = getgid() r33 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000004140)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000004240)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004280)={0x0, 0x0, 0x0}, &(0x7f00000042c0)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004300)=0x0) r37 = getuid() r38 = getgid() r39 = accept4$packet(r0, &(0x7f0000004340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004380)=0x14, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004700)={0x0}, &(0x7f0000004740)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000004780)={0x0, 0x0}, &(0x7f00000047c0)=0xc) r42 = getgid() r43 = gettid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000004800)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000004900)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0, 0x0}, &(0x7f0000004980)=0xc) r46 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000005300)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000005400)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000005440)={0x0, 0x0, 0x0}, &(0x7f0000005480)=0xc) sendmmsg$unix(r0, &(0x7f0000005540)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="76012c4039f3b0405c9593ff38d59b1f9e9def9a9182a18000b99413d43a6e77753bf1b730fa94bf71a04d4be405db8a2462fb24359b9082b26b9639072313ab91644fc171cd2bbfdca60114b65d6353c4605b7a198729716d182de3f498d4a13cfc3e757b03bebe00c9d51deb74573bd99a33812e1d20d1195ab62ccca982491512a8abbf622893d125cfd4a2f44add237c7aa6b3cea8086dd14d8817d424dbf7abf05882cd8375eb1481745161ba568554cbf9f0e0d902bf895c43589a0463f4ba9451cb07cbb743f3639084979ac23a28380674647785", 0xd8}, {&(0x7f00000002c0)="7c7aaa40f43bdb520322d30a686adcaab24841ba5e2205bb37e68ed13b27ef3db081b3f5d6ffc4b3471b7f714813fd59567b2a0afcc75e47d449c7fc8fb82f724dffc35c64ba96f2f2556cafd5d5e13488bb2a18cd361f333ee363183a812026cc138eb8fb9e01ecded940bc3ee424ff872c7dcd0308c90a9aa1aa1d9c09abaa6fafd534ec3390661fca2fd88fb40761e95ab6b96d9ef1617f4bb4d21012db6777e1d6f03323ae9889a2c30f72c94b72c3478c9000226eee56c94f83037c13ce3433dbfc1ce7b92ee2426b7969b91939635f15fe69b7dff96c7e209eac331c0f7b4f506b2b4eaf4f3cddf9a9589f30b22c90eeba", 0xf4}], 0x2, 0x0, 0x0, 0x800}, {&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000440)="dbeb0dd4177314d702b9f5fa84ca71d59be55e0159b29933d1bde8f1bc5fc1118f583288e7418ca93ccc0a81a99145f93a2303c9b363bd7872c981b3f3362cbf3bdf58039595f8fa09b4f574f2", 0x4d}, {&(0x7f0000000780)="6d8bce0d6f57a279b4fd014851e4882d2edbf5142d98fdbda199a4ea9d4e990bfbfdb935a0ce4c3bb3bc24564405350a438d51ea7a319cabe3454bf5d38a222bf7a16bb0d948491b3523c92d2ea990a9917ae07444b05f264b7dbc6114961fd2ce253345c2dd5f857ae65a382165722f5f24f50f60a97d288491972ec07d4234486a6bdce682e6fd2dfc33b73b65f555746f3cdf9e760939faefa78c45c582317d59fecac2b2555d7ed61338cf4ce119c047cf467016c5ceb6883c", 0xbb}, {&(0x7f0000000840)="2f8b01aa931642e8c09ceed6ddd0f22fbaca576968d4ec6e340d8533783f77112bba026f323548709dd001d7d16d75642697c542efbb0ca6c64dfc0a6444ee1b6f3334a056dd63258a7575b3f5e9afce25ecde419537774c0154c2", 0x5b}, {&(0x7f00000008c0)="6a57a0bf14bcac313c1dd6ad3f558f7be96102e0277b6e02499e27a3b6dec7211da24c09530a8ae0a3aaa4e9aaa6a1afb0697d148164514185ba7cd1d7603c96644edcce8df4921af565d62c3ad935b8ff1582fdac0ee1712ae7dde7b1f7b45e", 0x60}, {&(0x7f0000000940)="0cd10a4191180c54edd859c6846251e462fe7743fa91eee3d058e4b5a1552dc775a029424df179dd811bd1e0daaff45e0bd4416970940e2419a40b66135a3e3a38e310cbd2c384e4fa02918559dba18a12cd6c23fdcf5c2224fc04d54688d129274877071507097db05dd69fa38d26", 0x6f}, {&(0x7f00000009c0)="fc188ad47823c961f0910ba6e3650b3e78e1dfb207ba5a3f13ce44f9d3694a1e42756e5177fd8c2e6aae79b321a3c0d13d42efea1080d312aae774bf2c682f1847449373c9c6127a4ad6380c2f5b3d042a44216506179a6c3792bb58496288e8ab0e20769ba4ad9e9f1a94829925eb9f5071c098273430ced8a88d7bec7b0aaa8309c0b2f22378c5dec4d30798217dfa66448240762290a3", 0x98}, {&(0x7f0000000a80)="6376f4b39a22f4bcc3b5b73732234e9a0f857cdc036a271c42da0a18f42112e44ae5d658ef809d87fe51a028fed832f571cfc62c3107872c4ef3939effff438778cc6e9a5cd81f2c7c41ac688c99c046d71ed5d27c39490a7fb659502030bc10ac7e269e978556a68b1143789f0462e5691058dec196c7db3c2ad5a1a07428615788fd25530ebf52f578d670e37c07b59f285e6bf4b158b7561114ec630b3ba1a96eecfa293a112f5d1e1e05078aea5e85eae76b9e4a7c8d041099c8ea4bb84c9d32c72180f3e551c82b5414a4d17c80d7c77c96283f88724600111a619388ca62a785042c3587e90d997cf626853813e41cab90c756b445", 0xf8}], 0x7, &(0x7f0000000e80)=[@rights={0x18, 0x1, 0x1, [r3]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}], 0x98}, {&(0x7f0000000f40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000fc0)="7bdba62e7785e5517f67b7d4510527dafbb87b575e2f023e069a62d29859828694277315755340129ad89daddae9438c3f850f0d3cec066757416e2572f98d6d8fa10df9f7404d4bc4d70bea270ea59b1baca58d66dd91477d733d8bce9538038510012651b4fe3968f2cc457a330b143d01f86854972877394eb21643d40bef79ba21bd3362ae315ee757434d850f4d43b9c60898ca2d71c6d97f95ba2735bc7f1ce3adc1fa659b7361995a2decf00760a710ed2da81498843e71db77b4037b7bd346ba1bf714cce3476561d099", 0xce}, {&(0x7f00000010c0)="367c7550e1a0f54d34a857554f7dfe4379f08d00500d2d1cb9544c5ec48341fe72c2aeae012cfcb76621222ddf6ec95640ad49ff429a702db9c8d6db2a7b546e7f3e8c9888ddc413162f93107cdbc97a6fe1ddafe72c2892145ab4c8102ff269102f29b49eb2ac064b315504ebfe2ff04bc1b1b7abd8009192539e83911892741a8b6c7ee127b9ea0e5499ef38a86d8667", 0x91}], 0x2, &(0x7f0000001380)=[@cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x30, 0x1, 0x1, [r0, r2, r1, r1, r4, r2, r2]}], 0x50, 0x4000080}, {&(0x7f0000001400)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001480)="f84da5179b93c5c7ad8044ae143060ad596b812ac394f7d675ffe8294dd1ba238c842ff308035190e5466a81ff46779afb1c906620fd2c11be8772366138078b10f644bcda9dee5f506560a409e43f1e8a7d71bf557580f7657c41a70d5db1f6dd8ba18208f4d1e7127fdfdadf841ff95a6a7d210e20289e852489410d72c1e26dd65e60936e1a4803f16433a720a2e2a59f1613a32601bec3202dd7aa4d2a43f1e8d5807d741b6c02d63d2aca6eff555528ce0784aa85dfc6b0d163746e12954895b04ae1a423f9ea75ef9bd216049fc4abc672411ec1267951ceeac0eaa8bb10", 0xe1}, {&(0x7f0000001580)="c71d2d10660347abe2a026dedf64ccaac953de9dcea719317c618bef2df3be25d99f1669be", 0x25}, {&(0x7f00000015c0)="0a6071a92e7e5df35b5459ce6078adb675edb0f56781a03da9df78a5986f65849daf6b155179753653af133ebd8d5a02053eb85211af1f0be2f344e72cb69c3f1aa89e685caab7d64d101964af320655f23e8c9774dafa6f03ce660ef7b58a6fc4c6b2fd55a10ee3817bb7809513abdb9146a5", 0x73}, {&(0x7f0000001640)="d847784fcd719dc8bffa6fc63a98be9752b2cf13aca6e08ccf2847be5035f3217adf8d1207de6daa4d5569bfa7de0b0117c8e98ea34421a188", 0x39}, {&(0x7f0000001680)="9f555a4126fdf7d06b37967289d2f406c2b018d9ad43", 0x16}], 0x5, &(0x7f0000001c40)=[@rights={0x38, 0x1, 0x1, [r3, r4, r1, r1, r3, r4, r4, r0, r2]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @rights={0x28, 0x1, 0x1, [r3, r2, r4, r0, r3, r3]}], 0xc0, 0x4000000}, {&(0x7f0000001d00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003f00)=[{&(0x7f0000001d80)="0e096c5baf525bb31bb68469ad8420bdba75b6c4007b686e5110f9bfd863351e206ff15c20b39644b6e92f87773a41b2d9433382dc0044c927c4103ca50ff75af96746d37eeaa1cedc74351fe48b0ab0e98bac864b", 0x55}, {&(0x7f0000001e00)="0de0728e38612e9ca57aa4523a2d39b5e78180bcc35426655fd17cc0fba901f0705fc0b89276e7edd01ae120daed7b0dc86040619bb08acc95a45bca35b5cdb30414f401a291ce1afb25", 0x4a}, {&(0x7f0000001e80)="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", 0x1000}, {&(0x7f0000002e80)="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", 0x1000}, {&(0x7f0000003e80)="822179629b49010e12c65029a7dc3dbba3fa3d8edceabc98dee589a3b77f780f7ab9cdb722a5b6cd5316b7cb2ef677cd03b22207967841e3f7b2ee998f6ff28241cf79a9ddd6a9c6be403d0bcddb813a3984d10ced7da8a7bcef3a37616cda4f1c170099cf143fa65353dd36bb507105a38088b4c6dcf10ea3d7a6c00b", 0x7d}], 0x5, &(0x7f00000043c0)=[@rights={0x20, 0x1, 0x1, [r2, r4, r3]}, @rights={0x18, 0x1, 0x1, [r3, r2]}, @rights={0x20, 0x1, 0x1, [r0, r2, r3, r3]}, @rights={0x18, 0x1, 0x1, [r1, r2]}, @rights={0x28, 0x1, 0x1, [r4, r3, r0, r2, r1]}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @cred={0x20, 0x1, 0x2, r33, r34, r35}, @cred={0x20, 0x1, 0x2, r36, r37, r38}, @rights={0x18, 0x1, 0x1, [r39, r1]}], 0x110}, {&(0x7f0000004500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000046c0)=[{&(0x7f0000004580)="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", 0xfb}, {&(0x7f0000004680)="9b0f99c9bd86a90e957a60bbb2655e5b703db88f14cd903d4da2923311e8269d9c79b168df693a60c36972724f7b6031c01a5359", 0x34}], 0x2, &(0x7f00000049c0)=[@rights={0x28, 0x1, 0x1, [r0, r2, r1, r1, r2]}, @cred={0x20, 0x1, 0x2, r40, r41, r42}, @rights={0x38, 0x1, 0x1, [r2, r4, r3, r1, r0, r2, r1, r1, r0, r4]}, @rights={0x20, 0x1, 0x1, [r2, r1, r4, r3]}, @cred={0x20, 0x1, 0x2, r43, r44, r45}, @rights={0x20, 0x1, 0x1, [r1, r2, r4, r0]}], 0xe0, 0x800}, {&(0x7f0000004ac0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005240)=[{&(0x7f0000004b40)="b6cd7717c69f62c490c6b53dfb14bdba61fdf25604d40888e3e7b90ffa882acd079ac90331907ef0d40535da1656626498862b8210f413490daa076537a8ea7b1439aaff8c46f76dd3f3313cb659ca54b7f23cb7430109d8205525254bf93dce4047e37fbd13b56635f0b267c1137082f5823d85067dd70b1cec75697486cb577255c33bd22dff57d47ea8ab76bb0d6fe62e5fb460dedecfa2cad700d99dd4d14ade35ce388d97e5f46724d56ba6878f214fe2284049ab7a42030378272a9e57aa3e5f02c0e91642650ac0038c9295f7", 0xd0}, {&(0x7f0000004c40)="d3ea9f2125f46d449140e0f0a1f17a77cfcb03e4ea378cfb0aa772dd06a6f77cfc78a11ba744494b51f947ea9f2d9b7f2b30f4530689ae6ab2e57be1c5a177e431fb6c9e7b5edd52d1d45d276f21d9bc3b3942852388ece64fcfe9a6a43ba9d317e983679b545fc020c4c68c553221b79ef3b46fcd5db18d39caf2109cb61aa6972a253b7a9fb07ca8fd817e445b75b7f7ff80649011a4a0dc2b57997f03db577c487b9a5e74cb6a12227379cedd66c0f5141a4b6848698f089d866ff1f50fce75a3b1963ab897e71a1ec5376da0a649b20d7540e3cb3e8d5275d5dd561d0ef1892abad5e9755b1acc242107b6d0b0", 0xef}, {&(0x7f0000004d40)="b1ce75d687e05aeb99221f204b843a80822a22f06b34b4d3d24f2244319a1e9a56359a75038b705d7044922d29f0fd522c5e74e9f87bc53301f3d9fca7832f18cefeae2d9a1b956e2120f66459ec7b13fb108446c397c04445f6d277bc98c680915eccec5972239656b283b43b52d7ba0801a7b565398f23f37afc7c93017d60201ebb40bb8bcc71cc385e1463d3ed6f66f1e79f5355463391c3c66a2d316c368ceacb4054ee78bdba3be0424dcbbbcc07084778cab49a655624a11accdf890cc76b6e64aaa6816985d8115409e8d0ea2863581350cfc7b08801832ba00e5bbb9b1f6a2de9d49e73e81aef60dd5d8cb4174e6038f163d84b", 0xf8}, {&(0x7f0000004e40)="9e008eaf9de0210bd927c3dcdf94a3fd380e3528f4d0bcea614cf154e1b6", 0x1e}, {&(0x7f0000004e80)="e38757677fd9fea19816aa70e1423551a3e5fbfc7926d7644d03640e32428e7163f7298aea1253db0dcde66cbb911529decfc478c44940b1301243c00d78ca34c35cac64293d758e06c72353da3de92a668f8366a2b6533a30ebb30486f7a3fe2c0a1edb9ff33934b06fe00201f921f4f8907a1e", 0x74}, {&(0x7f0000004f00)="048b0c85135c6c66f9938e04e1c26c7b9609063bc21457653d4f5f2dd9d40848a89326c2d6e52a5db9fe8804fd512b91345f1a83840cfa5f4aede4c90c7362c0ce24ca6a47f5db0b330ca7db845af5c10aa18999bac025b89dd2373981f715bf1aaa92", 0x63}, {&(0x7f0000004f80)="2d756417d45d0c18a75f05d9ce8e30e432a7faf57dd72a383e95d6443ae65059638064f90349423f380554f1548edb50a8e6a442592a09fdba929689b23470a74fe3dc9b56f3713c5df115f29f793aec885f9d63ed22e45fd387aff6d9f107747261c54a56c876463920c8928afddce32c9816b9fddc2e8e4c2de0c2bb9bf6a3fd811bc4852ada9b3c2c56c5a14923491925cdee295d4b3913dc31af76a3e2f5daf6c87828a9491d2bf4fd1f217ba63352d0bfe50ea2fff147b33e2dca4a81b8e6ce22d615dfbe37a1f4a11bb7bc198868de980bd6430dfff9e0f76dee3e76ff0977f34c6b44e92b2fa27b5af13c368053ef", 0xf2}, {&(0x7f0000005080)="1642754295155fe7bc2b7d878fe6cf3f6ec66bc256140923508c5bd26fc230d2a06415602029b97333e554854c73d97f899e96a7a33f7cc6a46b286bb8894cc9ee71a6984c5523b80516ddd3d487b39e14c62868e77b6a28261d8a96afc03a270a0abf9c95e279caea2cde0a26602b138a02056aadaf72d2b986ab72ab70fa724a9833319b6db9e66bb4ce78a07c9d10655c088dedc5f76d2b7c38d94e2500bf81a40072a1795a29af7b65d78a88c418b4475d8deeeaff96e35f730b03d5983da06d935edd251062e2881ffe86931b9273cb3c67d5b906511e25bfa21035b15a7b82748adb258ccebb42112c660ba32ab1e201382d91674ef0", 0xf9}, {&(0x7f0000005180)="fe7084c689c1b08e332e87df0598a2e64c83fd0adbd9aff1d89f1c9ba9d082e3", 0x20}, {&(0x7f00000051c0)="fc1843ceb36be93accf935b6b98b6e4b35d0f290a79480443cf840dfb4cf3a57a28bfd015675c80ae60d9946349ec431284d496768a2eedebd72c53c9571a6bfec1f0bdce8", 0x45}], 0xa, &(0x7f0000005700)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="00000000200000000000000001000000020000003ce4c4f09e58d1d5d14d2b60b3e7a6b3266fb00d3fc5b4b7153f91f7c1011769479874a147c22241bdd5badc3416bea0e1a0c7d5f2055c36f955340075ebf6de6add070a30e61a67e976982d10a7eca58b534f038538ea73a532929f09cc2062300569661d62b750059bf4", @ANYRES32=r46, @ANYRES32=r47, @ANYRES32=r48, @ANYBLOB='\x00\x00\x00\x00'], 0x50, 0x4000}], 0x7, 0x8801) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x80040200, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 672.501334] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x578}, 0x28) 09:24:56 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slav\n_0\x00?', 0x2000000c0ffffff}) 09:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e0000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:56 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='\xaeQcgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpu.weight\x00\x18\xe0\xc8\x93\xebi\x8dq\xd2\xdcr\xaf\xa4+\x9d,y`\x8c\xb8n5\xd8,\x98\xc6', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x3]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 672.688791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.708290] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.714735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.991402] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.999367] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.005814] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x579}, 0x28) 09:24:56 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x80350000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slav%_0\x00?', 0x2000000c0ffffff}) 09:24:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57a}, 0x28) 09:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x81000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 673.534685] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.543766] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.550251] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x84ffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57b}, 0x28) 09:24:57 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x86ddffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 673.924017] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.932282] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.938713] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57c}, 0x28) 09:24:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:24:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slavf_0\x00?', 0x2000000c0ffffff}) 09:24:58 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'irlan0\x00', 0x201}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88470000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57d}, 0x28) 09:24:58 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000200)) [ 674.492711] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.511896] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.518406] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57e}, 0x28) 09:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88480000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:58 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'gretap0\x00', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x20000000000800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 674.859836] bridge0: port 1(bridge_slave_0) entered disabled state 09:24:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:24:58 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000200)) 09:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88640000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave\n0\x00?', 0x2000000c0ffffff}) 09:24:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57f}, 0x28) [ 675.004142] device gretap0 entered promiscuous mode 09:24:59 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000200)) 09:24:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 675.548077] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.557298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 675.567734] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.574212] bridge0: port 1(bridge_slave_0) entered forwarding state 09:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88a8ffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:24:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x580}, 0x28) 09:24:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_\n\x00?', 0x2000000c0ffffff}) 09:24:59 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={r4, 0x4}, &(0x7f0000000080)=0x8) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:24:59 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) [ 676.004294] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.021288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 676.029627] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.036070] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88caffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:00 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 09:25:00 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x8001, 0xa, 0x34e, r3}, &(0x7f0000000040)=0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x581}, 0x28) [ 676.377777] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88ffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_#\x00?', 0x2000000c0ffffff}) 09:25:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:00 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 09:25:00 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x200, 0x5, 0xffff, 0x3}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000000)={0x77, "0b6d66b88d9a3501d7fbbda1f66a2b4e9025cbe7b793696442708746a9b00efb05860959d35ec9ab4704a33fc32a9ec0ba7d07d9916275a121b91075ffca1f9dcee22718d81fc25b370a7a6a5a6965b27ca86ae472e99b505be1b2c6f9822812f3330e2e12541e51d534a56bfd64b7b4c98d5a11433c79c36b67e3672041572c"}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r3, 0x4bdb, 0x80}, &(0x7f0000000180)=0x8) 09:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x89060000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 676.651018] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.657479] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x582}, 0x28) 09:25:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2098, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x214}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="20000000000000000000000000000000f870f758cca8455b1f6294c614a94e5e7b6de341b491f0b2136ae1ff2ea604c32fb352d55331ef7d4f602d197ec879689931caf5d3060b4032aa239bf16d3e24090d4b381c26dc66b64cfc48b999f7d052067b7947e1534b6ddc48a12c84c52109fc831a486017bdd0bb516dc9e3815898a2221bcbb2c70e249ca4982508174c62b79c8ea4342f39359efd31681830ca29fac2f422df09f0962873935a01a46467f98702602f9aec187e228053b0ec34d650cc6b029a7427050fa7a1276040"], 0xcf}, 0x60) 09:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x89ffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 676.994051] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.002891] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.009364] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x583}, 0x28) 09:25:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) 09:25:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_+\x00?', 0x2000000c0ffffff}) 09:25:01 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfdffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 677.484567] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.506718] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.513228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.520034] net_ratelimit: 20 callbacks suppressed [ 677.520041] protocol 88fb is buggy, dev hsr_slave_0 09:25:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x584}, 0x28) [ 677.530135] protocol 88fb is buggy, dev hsr_slave_1 09:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 677.594728] protocol 88fb is buggy, dev hsr_slave_0 [ 677.599938] protocol 88fb is buggy, dev hsr_slave_1 [ 677.605145] protocol 88fb is buggy, dev hsr_slave_0 [ 677.610264] protocol 88fb is buggy, dev hsr_slave_1 [ 677.674771] protocol 88fb is buggy, dev hsr_slave_0 [ 677.680001] protocol 88fb is buggy, dev hsr_slave_1 09:25:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) [ 677.804517] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.841990] bridge0: port 1(bridge_slave_0) entered blocking state 09:25:01 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept4$inet6(r0, &(0x7f0000001100)={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x1c, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x6, 0x23, 0x8000, 0x4, 0x6, 0x7, 0x401, 0x5, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000001c0)=""/136, &(0x7f00000002c0)=0x88) r3 = accept(r1, &(0x7f0000000300)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000380)=0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x10, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40488d4}, 0x4000080) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000180)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_int(r6, 0x1, 0xd, &(0x7f000059dffc), &(0x7f0000d8cffc)=0x4) r7 = socket(0x800000000000a, 0x80005, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000001980)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000001a80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001ac0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001bc0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001c00)={{{@in=@rand_addr=0x3, @in=@multicast2, 0x4e23, 0x6, 0x4e21, 0x81, 0xa, 0x80, 0xa0, 0x7f, r9, r10}, {0x800, 0x5, 0x4, 0x200, 0x4, 0x1ff, 0x6, 0x100}, {0x80000000, 0x100000001, 0x3}, 0xffffffffffffffff, 0x6e6bbd, 0x3, 0x0, 0x3, 0x3}, {{@in=@broadcast, 0x4d4, 0x6c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x27}, 0x3501, 0x4, 0x0, 0x3ac0e755, 0x161, 0x80, 0x4}}, 0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r8, 0x40047452, &(0x7f0000000500)=0x3) socket$packet(0x11, 0x2, 0x300) r11 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) bind$can_raw(r3, &(0x7f0000000780)={0x1d, r9}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r11, 0x84, 0x70, &(0x7f0000000640)={r12, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 677.848509] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffa888, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x585}, 0x28) 09:25:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_-\x00?', 0x2000000c0ffffff}) 09:25:01 executing program 0: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x8001, 0xa, 0x34e, r3}, &(0x7f0000000040)=0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffca88, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x586}, 0x28) [ 678.374329] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.384339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.396691] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.403208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.530328] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:02 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 09:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffdd86, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 678.777436] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x587}, 0x28) 09:25:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_>\x00?', 0x2000000c0ffffff}) 09:25:02 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x22, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x6, 0x200, 0x80000000, 0x7, 0x73, 0x4f2, 0x3, 0x488]}, &(0x7f0000000040)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x53, 0x4) [ 678.914044] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.920503] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffff000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:02 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 09:25:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x588}, 0x28) [ 679.194726] protocol 88fb is buggy, dev hsr_slave_0 [ 679.199848] protocol 88fb is buggy, dev hsr_slave_1 09:25:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x589}, 0x28) [ 679.331221] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.339687] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.346150] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x588}, 0x28) 09:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffff84, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:03 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x1) 09:25:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58a}, 0x28) 09:25:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x04\x00', 0x2000000c0ffffff}) 09:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffff88, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x57e}, 0x28) [ 679.888073] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.897985] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.904404] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffffff89, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58b}, 0x28) 09:25:03 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x8000000, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x5, 0x0, 0x1000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 680.272721] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.281232] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.287628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.308395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58c}, 0x28) [ 680.331321] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.337810] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x02?', 0x2000000c0ffffff}) 09:25:04 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:04 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x4e22, @multicast1}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58d}, 0x28) 09:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xf0ffffffffffff, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x576}, 0x28) [ 680.821594] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.832506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 680.840545] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.846973] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58e}, 0x28) 09:25:04 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x1, 0xbbc5, 0x3, 0x3, 0x3, 0x1000000000, 0x20, 0x390, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r4, 0x1a, "3f9dde437418ce0a55b662800656a34c183e4c55ae77b9d8ddf2"}, &(0x7f00000001c0)=0x22) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r4, 0xfffffffffffffffb, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x03?', 0x2000000c0ffffff}) 09:25:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58d}, 0x28) [ 681.249910] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x58f}, 0x28) 09:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x04?', 0x2000000c0ffffff}) [ 681.418636] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.425280] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:05 executing program 1: r0 = socket(0x820000000000a, 0x80005, 0x1) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000300)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2, 0x104, 0x70bd2a, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40050}, 0x4000000) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r4 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000007c0)={r5, 0xee, "66de9eee684fa0765ddddffe628c2a67aa98bdf1b1d323a06a4e91bbbd3e3e7654e59d89e472fb83c607ffb6cd638b0ffb5c341e982e13d7c3cd76b0a72aab3997d0e72d2d660d978dbc01ab0b8e4437d4ebbf19bc0e31b7c5f108bd753d3a8d2f631245f297e5f80fa171b7189b244fc049fcfbf9a0b55dd30d0f2ad5fd8c9764eb30e21662ba698b8dc6be8f0f071d00fca54de3e90c09f8cea16a865c9c4c4a959450847aa02190fcc5f6d1ec721c79c4c50a81f1e897ca2cfa400089289a0011cd58b164eaf7fa2a1ab7c1787d5c3fc257a43e88b847788f9e77c92362187e088fe2cb50016e1ee0a1612bab"}, &(0x7f0000000500)=0xf6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="b09aac99b7fb8e715d1105d73029c30b1b33bf6a386684902f12fd1f203d8c41ed3fed6df21203268559dcb35e844ea68edbda191520ea5fff1ec64329a5512ebf179da133c660e2e241648787bc804648e9f701580dcce23325568c9fcb20b61baff7022a451ab697d9260348032537de4389c23247f70e7cae5a"], 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000400)={r5, 0x94, "7c7b7c8f0c70e6e1694f791e609f96de6338f723c976f251b8d950c09d96070734d933c3f6242e28fac283d05022992bed797fc7890c59ab737ffbdcaa47b03733f8f31cbd1abd3e4f983e6e146c2bd390cdc4b174250564a5d56ea03468727f511acb2d6b4a335f21041692899a39d37d8f0fac300c09ec360939237d99419c8c157c4fa477fcb5828781f7cbac75301074f709"}, &(0x7f00000004c0)=0x9c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000780)=ANY=[@ANYRES32=r5, @ANYRES32=r5], &(0x7f00000001c0)=0x2) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:05 executing program 0: r0 = socket(0x800000000000a, 0x80005, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x1, 0xbbc5, 0x3, 0x3, 0x3, 0x1000000000, 0x20, 0x390, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r4, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r4, 0x1a, "3f9dde437418ce0a55b662800656a34c183e4c55ae77b9d8ddf2"}, &(0x7f00000001c0)=0x22) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r4, 0xfffffffffffffffb, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x590}, 0x28) 09:25:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 681.842841] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.850848] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.857354] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:06 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 682.054365] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x591}, 0x28) 09:25:06 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 682.397950] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.406324] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.412841] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x592}, 0x28) 09:25:06 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x05?', 0x2000000c0ffffff}) 09:25:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x593}, 0x28) [ 682.764020] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.773174] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.779714] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:06 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:06 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_s\xbeU\xc4\xd0}\x1edk', 0x7fc}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x06?', 0x2000000c0ffffff}) 09:25:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x594}, 0x28) 09:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 683.308154] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.317699] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.324322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 683.354757] net_ratelimit: 18 callbacks suppressed [ 683.354764] protocol 88fb is buggy, dev hsr_slave_0 [ 683.365017] protocol 88fb is buggy, dev hsr_slave_1 09:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x595}, 0x28) 09:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 683.655079] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.664060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 683.671821] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.678277] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x596}, 0x28) 09:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:07 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) recvmmsg(r2, &(0x7f0000001480)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f0000000100)=""/167, 0xa7}, {&(0x7f00000002c0)=""/228, 0xe4}], 0x3, &(0x7f0000000200)=""/16, 0x10}, 0x2}, {{&(0x7f00000003c0)=@ethernet, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f0000000780)=""/32, 0x20}], 0x3, &(0x7f0000000800)=""/132, 0x84}, 0x2}, {{&(0x7f00000008c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000940)=""/121, 0x79}], 0x1, &(0x7f0000000a00)=""/41, 0x29}, 0xd4}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/147, 0x93}], 0x1, &(0x7f0000000bc0)=""/38, 0x26}, 0x2}, {{&(0x7f0000000c00)=@generic, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/79, 0x4f}, {&(0x7f0000000d00)=""/124, 0x7c}], 0x2, &(0x7f0000000dc0)=""/255, 0xff}, 0x80000001}, {{&(0x7f0000000ec0)=@nfc_llcp, 0x80, &(0x7f0000001400)=[{&(0x7f0000000f40)=""/216, 0xd8}, {&(0x7f0000001040)=""/218, 0xda}, {&(0x7f0000001140)=""/54, 0x36}, {&(0x7f0000001180)=""/239, 0xef}, {&(0x7f0000001280)=""/92, 0x5c}, {&(0x7f0000001300)=""/175, 0xaf}, {&(0x7f00000013c0)=""/19, 0x13}], 0x7}, 0x1f}], 0x6, 0x40, &(0x7f0000001600)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\a?', 0x2000000c0ffffff}) [ 683.834730] protocol 88fb is buggy, dev hsr_slave_0 [ 683.839841] protocol 88fb is buggy, dev hsr_slave_1 [ 683.844999] protocol 88fb is buggy, dev hsr_slave_0 [ 683.850078] protocol 88fb is buggy, dev hsr_slave_1 09:25:07 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x597}, 0x28) [ 683.914757] protocol 88fb is buggy, dev hsr_slave_0 [ 683.919911] protocol 88fb is buggy, dev hsr_slave_1 09:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:07 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x200000000007ff, 0x43) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x800000000000007, 0x8001, 0x401, 0x6, 0xffffffffffffffff}, &(0x7f0000000600)=0x98) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 683.993578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.009966] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.016421] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x598}, 0x28) 09:25:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 684.313269] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.321280] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.327716] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x806000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:08 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\b?', 0x2000000c0ffffff}) 09:25:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x599}, 0x28) 09:25:08 executing program 1: r0 = socket(0x800000000000b, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x900000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 684.834324] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.844233] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.850702] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:08 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59a}, 0x28) 09:25:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59b}, 0x28) 09:25:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x599}, 0x28) 09:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 685.194237] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:09 executing program 1: r0 = socket(0x5, 0x80003, 0x20) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04', 0xfffffffffff7fffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x7, 0x200000000000009) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x0f?', 0x2000000c0ffffff}) 09:25:09 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59c}, 0x28) [ 685.443982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.451552] protocol 88fb is buggy, dev hsr_slave_0 [ 685.451615] protocol 88fb is buggy, dev hsr_slave_1 09:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 685.496528] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.502974] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 685.793268] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.801411] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.807792] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59d}, 0x28) 09:25:09 executing program 0: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bpq0\x00', 0x1000}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x300, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$inet6(0xa, 0x20000000000800, 0x0) r7 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000008c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000900)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000a00)=0xe8) r12 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000c40)='bpq0\x00', 0xffffffffffffffff}, 0x30) r14 = getuid() r15 = getgid() r16 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000e00)={0x0, 0x0, 0x0}, &(0x7f0000000e40)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000e80)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001000)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001040)={0x0, 0x0, 0x0}, &(0x7f0000001080)=0xc) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000010c0)=0x0) r23 = getuid() r24 = getgid() r25 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)="5b6760ea2218264940c22b08429a58aca65a11c12396c3e6af", 0x19}, {&(0x7f0000000180)="fb4d41", 0x3}, {&(0x7f00000001c0)="974204ccf20c37ba241b5a954945637e94dab880803d830a88dfb750daa9292b9bb6a853b1715e79fc5cbc38b46f8bc1ab8a4def8bca9122b96af18ef48242c7935d074b8e1a6b8f8e4f9ae377aa6df2e2994c309f40472f28991bef5d92eeee0fb878369548557ab3aef5e54a7fde7a3a367e9ccf22925068b85a0467c4b2b4b593b2b681714d575d805e151a24e3e03ea393267ec039fddec5401720d309fb9a6b59e4045416593deda5f27191e66879adba5f", 0xb4}], 0x3, &(0x7f0000000a40)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x40, 0x20000000}, {&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000b00)="f01ff0a3c96103495c8c214d81f775a09684d5e71ad918e96e337f9bb572f6f8aabb2ecdff99c62bddce4008bee871e435944dd74147ef6d1d6011ff1d1843bc5068fe82a8abe72f7b9ffdcbee81b195174deb3de6610d2b6a57a44b7fbc9ed47d3337b31a849a8ca61e59c3f57138d2b9f77318fdcd765a681be7c605fab740363317108135e9b0eebbe8055d82afec097f2b2194b691e66a332b6dd77fa7ba3cfed405ee46120b03fa019c62e3a52acb332c811c1f4ae9a684ad463d374a96ed47bd21dfc9d8691c016ffa7c631e1a6010beef70d275477d9739a93564f67b689a5c3185604736e7892bf3", 0xec}], 0x1, &(0x7f0000001100)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @rights={0x30, 0x1, 0x1, [r2, r6, r4, r25, r3, r0, r6]}], 0xb0, 0x4008000}, {&(0x7f00000011c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000001240)="645baff745f408deaf3ba1e0d68c604fa0f31ee611294316393546f9e38b70dbbd122698eb8cac510c4ddce3d719fb38c7f2e5007b5f0508c8b62507ed6dd431f56d3279917448e723b5ca8fc6cc634a8369420e207789a44b66f2abc1668d4ce4c7a435a7eaaf6bfcbfd4e02697505d8389bd743054f6ca8a46e6b77b1117d6ccb29d7b64d79c93408994e4fbc4818e843fcd6db19763320332eb25059dc2093ae5aa93413a488068c238af1e8755ece294445e4ad14c3a608b676ee174dee70e43779cc961e2ec88e25151fa1482150a9fc705f0e966a87b1f6c4258d1b2a3e2", 0xe1}, {&(0x7f0000001340)="7b83268bb60eeaf441b1580d91ac48b1ab2d3b24fc2eb7abdc", 0x19}], 0x2, &(0x7f00000013c0)=[@rights={0x10}], 0x10, 0x800}], 0x3, 0x8044) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0x70, &(0x7f0000000640)={r26, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:09 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) 09:25:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x10?', 0x2000000c0ffffff}) 09:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 686.075842] x_tables: eb_tables: redirect.0 target: invalid size 8 (kernel) != (user) 1 [ 686.311270] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.331580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 686.340848] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.347324] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59e}, 0x28) 09:25:10 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_\x00\x00\x00\x00e_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:10 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1c00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 686.690949] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x19?', 0x2000000c0ffffff}) 09:25:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x59f}, 0x28) [ 686.830905] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.837370] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2100000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:10 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x6) sendto(r0, &(0x7f00000002c0)="c292f2bdc1a7e9747916df09e35b5f81e294255e9d82dd855a57b95206c389378bdb73697eeb13c66f6ad3676f3153b82edbae2b8b7dbaa6bba3b25442762013811b217145b049e21d20395fed746ef74eb2c127a6a3f87bc6d86d66ddc89047fed7a31db4e15e81a55e1167b496000a033e447ba160709100ad9b34a4c122db1bdb187c93a522b1092fc5dff2d80f7549aa2e53b3bc0d675c0a80afdaa3dbedac660398256e99e196a47390d374eb229c6d51b3be9f0a47c180998f0d16b7a74e0ff3b1623abad633aa04374fcf8d624aff0dd7e1883f", 0xd7, 0x8805, 0x0, 0x0) r1 = socket(0x800000000000a, 0x80005, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000801, 0xffffffffffff9280) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r4, 0x1000, 0x76a, 0x8, 0x2, 0x303d}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockopt$inet6_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000100)=""/158, &(0x7f0000000040)=0x9e) socket$inet_icmp_raw(0x2, 0x3, 0x1) 09:25:10 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a0}, 0x28) 09:25:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2900000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 687.396332] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.404566] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.411015] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a1}, 0x28) 09:25:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x1b?', 0x2000000c0ffffff}) 09:25:11 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$inet(r0, &(0x7f0000000000)=""/70, 0x46, 0x40000000, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2b00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 687.810706] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.064305] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.072166] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.078602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.086120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 688.094523] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.100936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.115055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a2}, 0x28) 09:25:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:12 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvfrom$inet(r0, &(0x7f0000000000)=""/70, 0x46, 0x40000000, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a3}, 0x28) [ 688.438896] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.447627] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.454109] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2c00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x1c?', 0x2000000c0ffffff}) 09:25:12 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 688.729880] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.737512] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.743928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.751324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 688.760276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2f00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 689.044072] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.052148] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.058587] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a4}, 0x28) 09:25:13 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6(0xa, 0x20000000000800, 0x0) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000180)="0adc1f233c123f3188a070") r6 = socket$inet(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="240000002a0007011dfffd940101830020200a000900000006000000010000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 689.272499] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.280177] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.286677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.293962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 689.309077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x1e?', 0x2000000c0ffffff}) [ 689.594761] net_ratelimit: 18 callbacks suppressed [ 689.594769] protocol 88fb is buggy, dev hsr_slave_0 [ 689.604936] protocol 88fb is buggy, dev hsr_slave_1 09:25:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3200000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a5}, 0x28) [ 689.647602] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.655973] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.662330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.685371] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:25:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:13 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0`?', 0x2000000c0ffffff}) 09:25:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a6}, 0x28) 09:25:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3300000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 689.994752] protocol 88fb is buggy, dev hsr_slave_0 [ 689.999973] protocol 88fb is buggy, dev hsr_slave_1 [ 690.074776] protocol 88fb is buggy, dev hsr_slave_0 [ 690.080038] protocol 88fb is buggy, dev hsr_slave_1 [ 690.085234] protocol 88fb is buggy, dev hsr_slave_0 [ 690.090318] protocol 88fb is buggy, dev hsr_slave_1 [ 690.164786] protocol 88fb is buggy, dev hsr_slave_0 [ 690.169915] protocol 88fb is buggy, dev hsr_slave_1 [ 690.192760] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.204938] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.211394] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a7}, 0x28) 09:25:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3a00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 690.510016] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.518940] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.525367] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:14 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a8}, 0x28) [ 690.737711] device bridge_slave_0 entered promiscuous mode [ 690.769121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:14 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x3c00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:14 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5a9}, 0x28) 09:25:14 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:15 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 691.469660] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.485167] device bridge_slave_0 left promiscuous mode 09:25:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 691.680707] device bridge_slave_0 entered promiscuous mode [ 691.688767] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.695251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.859494] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 692.083306] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.096620] device bridge_slave_0 left promiscuous mode 09:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5aa}, 0x28) [ 692.368950] device bridge_slave_0 entered promiscuous mode [ 692.379370] device bridge_slave_0 left promiscuous mode 09:25:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 692.763935] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.774031] bridge0: port 1(bridge_slave_0) entered blocking state [ 692.780451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 692.789360] device bridge_slave_0 entered promiscuous mode 09:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x4305000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ab}, 0x28) 09:25:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 693.172598] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.181075] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.187495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.197104] device bridge_slave_0 left promiscuous mode 09:25:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ac}, 0x28) 09:25:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 693.647372] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.654583] device bridge_slave_0 entered promiscuous mode 09:25:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ad}, 0x28) [ 693.935398] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.944214] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.950703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.962606] device bridge_slave_0 left promiscuous mode 09:25:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 694.233528] device bridge_slave_0 entered promiscuous mode [ 694.738602] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.748052] bridge0: port 1(bridge_slave_0) entered blocking state [ 694.754515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 694.771722] device bridge_slave_0 left promiscuous mode 09:25:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8004020000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ae}, 0x28) 09:25:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:19 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 695.142346] device bridge_slave_0 entered promiscuous mode 09:25:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x800e000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 695.430265] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.440146] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.446559] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 695.573916] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.581432] device bridge_slave_0 left promiscuous mode 09:25:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8035000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5af}, 0x28) [ 695.805484] device bridge_slave_0 entered promiscuous mode [ 695.834817] net_ratelimit: 20 callbacks suppressed [ 695.834829] protocol 88fb is buggy, dev hsr_slave_0 [ 695.844899] protocol 88fb is buggy, dev hsr_slave_1 09:25:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 696.234750] protocol 88fb is buggy, dev hsr_slave_0 [ 696.239966] protocol 88fb is buggy, dev hsr_slave_1 [ 696.261373] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.273883] bridge0: port 1(bridge_slave_0) entered blocking state 09:25:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 696.280279] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 696.315026] protocol 88fb is buggy, dev hsr_slave_0 [ 696.320222] protocol 88fb is buggy, dev hsr_slave_1 [ 696.325354] protocol 88fb is buggy, dev hsr_slave_0 [ 696.325393] protocol 88fb is buggy, dev hsr_slave_1 [ 696.394814] protocol 88fb is buggy, dev hsr_slave_0 [ 696.399983] protocol 88fb is buggy, dev hsr_slave_1 09:25:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8100000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 696.443058] device bridge_slave_0 left promiscuous mode [ 696.754452] device bridge_slave_0 entered promiscuous mode 09:25:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x551}, 0x28) 09:25:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b0}, 0x28) [ 696.973057] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.980958] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.987408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.007030] device bridge_slave_0 left promiscuous mode 09:25:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x84ffffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 09:25:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 697.521277] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.529449] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.535876] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x54b}, 0x28) 09:25:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 697.565366] device bridge_slave_0 entered promiscuous mode [ 697.585065] device bridge_slave_0 left promiscuous mode 09:25:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b1}, 0x28) 09:25:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x86ddffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:21 executing program 1: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b2}, 0x28) 09:25:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x0}) [ 698.248238] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.257200] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.263591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.272974] device bridge_slave_0 entered promiscuous mode 09:25:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8847000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x0}) 09:25:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b3}, 0x28) [ 698.385127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.405651] device bridge_slave_0 left promiscuous mode 09:25:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 698.869285] device bridge_slave_0 entered promiscuous mode 09:25:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x86ddffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 699.093045] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.101028] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.107479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 699.125569] device bridge_slave_0 left promiscuous mode 09:25:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8848000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x0}) 09:25:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b4}, 0x28) [ 699.446281] device bridge_slave_0 entered promiscuous mode [ 699.461569] device bridge_slave_0 left promiscuous mode 09:25:23 executing program 1: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 699.921863] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.929991] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.936425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 699.946666] device bridge_slave_0 entered promiscuous mode [ 699.954045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8864000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 700.413813] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.422621] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.429150] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b5}, 0x28) [ 700.527803] device bridge_slave_0 left promiscuous mode 09:25:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x0}) [ 700.864707] device bridge_slave_0 entered promiscuous mode 09:25:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88a8ffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 701.086618] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.095073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.104914] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.111254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.310043] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.317707] device bridge_slave_0 left promiscuous mode 09:25:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b6}, 0x28) [ 701.654676] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:25 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f0000000000)="c6ce0003e90688f25d61d559281375d8fe481917dba9286ef775cdfb6c3cff1ceb819e2619b9a11a809b7c8bb141d2e88902f6471657a066ccb8fca84a19c77bfd8cc961a6ef58519c240985ebff", 0x4e) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00j\x87&\x88\x00\x00\x00 \x00', 0xa000}) [ 701.920430] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.929726] device bridge_slave_0 entered promiscuous mode [ 701.942909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.955459] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.961942] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 702.074746] net_ratelimit: 20 callbacks suppressed [ 702.074755] protocol 88fb is buggy, dev hsr_slave_0 [ 702.084992] protocol 88fb is buggy, dev hsr_slave_1 [ 702.474773] protocol 88fb is buggy, dev hsr_slave_0 [ 702.480021] protocol 88fb is buggy, dev hsr_slave_1 [ 702.514521] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.522659] device bridge_slave_0 left promiscuous mode 09:25:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88caffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 702.554777] protocol 88fb is buggy, dev hsr_slave_0 [ 702.559949] protocol 88fb is buggy, dev hsr_slave_1 [ 702.565111] protocol 88fb is buggy, dev hsr_slave_0 [ 702.570171] protocol 88fb is buggy, dev hsr_slave_1 [ 702.634746] protocol 88fb is buggy, dev hsr_slave_0 [ 702.639956] protocol 88fb is buggy, dev hsr_slave_1 09:25:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b7}, 0x28) [ 702.750949] device bridge_slave_0 entered promiscuous mode 09:25:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x4002}) r1 = accept4(r0, &(0x7f0000000100)=@sco, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000001c0)={r0}) 09:25:26 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) accept4$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x88ffffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 702.965811] device bridge_slave_0 left promiscuous mode 09:25:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b8}, 0x28) [ 703.503905] device bridge_slave_0 entered promiscuous mode [ 703.693246] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:27 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) accept4$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 703.782297] device bridge_slave_0 left promiscuous mode 09:25:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x8906000000000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b9}, 0x28) [ 704.118945] device bridge_slave_0 entered promiscuous mode 09:25:28 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x100, 0x3ff, 0x3, 0x40, 0x762}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r2}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x7}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x9, 0x2, 0x200, 0x8, 0x100000000, 0x10000, 0x0, 0x60c1, r4}, 0x20) 09:25:28 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:28 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) accept4$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 704.274991] device bridge_slave_0 left promiscuous mode 09:25:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ba}, 0x28) [ 704.543599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 704.561755] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.568190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 704.580282] device bridge_slave_0 entered promiscuous mode 09:25:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x89ffffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:28 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) accept4$unix(r0, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) 09:25:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'veth1_to_team\x00', 0xc00}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) bind$vsock_dgram(r1, &(0x7f0000001380)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 704.960494] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.969303] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.975759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.047954] device bridge_slave_0 left promiscuous mode 09:25:29 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x8000, 0x2) [ 705.322698] device bridge_slave_0 entered promiscuous mode 09:25:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5bb}, 0x28) 09:25:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5b8}, 0x28) 09:25:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfdffffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 705.702634] device bridge_slave_0 left promiscuous mode 09:25:29 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r3 = socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000640)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) 09:25:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001080)=[{&(0x7f0000000540)=@abs, 0x10, &(0x7f0000000740), 0xab, &(0x7f0000000a80)}], 0x153, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@hopopts={0x0, 0x8, [], [@jumbo, @calipso={0x7, 0x38, {0x4, 0xc, 0x2, 0xda, [0x0, 0x9, 0x4, 0x8, 0xb9, 0x5]}}]}, 0x48) r3 = socket$packet(0x11, 0x1, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x1}) r4 = socket$inet6(0xa, 0x4, 0x3f) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000140)={r0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000480)={0x0, 0x7}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r6, 0xe00b, 0x34a}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x7, 0x2, 0x4, 0x0, 0x5}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000300)={r7, 0x3, 0x3, 0x4, 0x101, 0x400, 0x64fb, 0x7fffffff, {r8, @in6={{0xa, 0x4e24, 0x284f3c1f, @remote, 0x9}}, 0x200, 0x0, 0x40, 0x1, 0x100000000}}, &(0x7f00000003c0)=0xb0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'b\x00', 0x2000000c0ffffff}) [ 705.955239] device bridge_slave_0 entered promiscuous mode 09:25:29 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 706.019862] device bridge_slave_0 left promiscuous mode 09:25:30 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bond_slave_1\x00', 0x2000000c0ffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) r2 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x1c, 0x80000) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000300)=""/34, &(0x7f0000000340)=0x22) socket$netlink(0x10, 0x3, 0x4) r3 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x2) 09:25:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 706.379797] device bridge_slave_0 entered promiscuous mode 09:25:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5bc}, 0x28) 09:25:30 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:30 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) [ 706.838092] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.850024] device bond_slave_1 entered promiscuous mode [ 706.957944] device bridge_slave_0 left promiscuous mode 09:25:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) write(r0, &(0x7f00000002c0)="e92fc5f6b5419cb6eb1c2bc03f10960e4d81266ba333442b059576a10f2f24411d043443cc10065ba1e15748a1310997ad7d28347955a208a11ad249d48757e02973fa567e2e1e6d921392eea13fb12a12714307bbcab3536e2a98c7c8b42162b41abb848ac54241e72371522c2295eda8d7d3b9bf041f7697cf4784647ab862ae2ad3bc0949cfc94b1e5524357ba73f5726ae7f33d13b231ed2d51477410a1771e1800e141f66e91d1050b279e27f13e6e298828df6c3b73c8c49ecdde834f400d01fcf6f87264b9606ada780338717f8b95802bd1f46b1a064802acf45", 0xffffffffffffffc3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') getpeername$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @broadcast, @remote}, &(0x7f0000000d00)=0xc) accept4$packet(r0, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14, 0x0) getpeername$packet(r0, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000f00)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001000)=0xe8) getsockname(r0, &(0x7f0000001040)=@can={0x1d, 0x0}, &(0x7f00000010c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001100)={@multicast2, @local, 0x0}, &(0x7f0000001140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001180)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001280)={0x0, @loopback, @broadcast}, &(0x7f00000012c0)=0xc) accept(r0, &(0x7f0000001400)=@can={0x1d, 0x0}, &(0x7f0000001480)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f00000014c0)={@mcast2, 0x0}, &(0x7f0000001500)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000001680)={@empty, 0x0}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001700)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001840)={'syzkaller0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001940)={0x0, @dev, @local}, &(0x7f0000001980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000001ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001b40)={'ip_vti0\x00', 0x0}) accept4$packet(r0, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001bc0)=0x14, 0x80800) getpeername$packet(r0, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001c80)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @local, @broadcast}, &(0x7f0000001d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001d80)={{{@in6=@ipv4={[], [], @initdev}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000001e80)=0xe8) accept$packet(r0, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000002040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002080)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000021c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000022c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002ec0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002e80)={&(0x7f0000002300)=ANY=[@ANYBLOB='p\v\x00\x00', @ANYRES16=r2, @ANYBLOB="000328bd7000ffdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004004000000008000100", @ANYRES32=r4, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400cb04000008000100", @ANYRES32=r5, @ANYBLOB="340202003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000700000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400650000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003400040001000705ff7f0000030024ff0900000004000881ff0700000700e307400000003d054006ff00000000000101640000006c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003c000400ff0003092000000037020100050000000500c50870000000b0275265030000000700050002000000570b090800000000ebfd08084d07000008000100", @ANYRES32=r10, @ANYBLOB="a001020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040040000008010100000400076800000000010142fe000600000800ff0703000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000240004009a000706020000000200020200040000468501c2729f5c7708000000000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="ac0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="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", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r18, @ANYBLOB="08000100", @ANYRES32=r19, @ANYBLOB="dc01020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fcffffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000000fd09ff07000008000100", @ANYRES32=r22, @ANYBLOB="c00002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r24, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400a607000008000600", @ANYRES32=r25, @ANYBLOB="08000100", @ANYRES32=r26, @ANYBLOB="b400020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffff000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000d000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400e100000008000600", @ANYRES32=r27, @ANYBLOB="08000100", @ANYRES32=r28, @ANYBLOB="780002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r29, @ANYBLOB="4c01020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000010038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c00040000006a0009000000251c02ff0700000004001f803f0000000600060102000000699a4e000200000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e636500"], 0xb70}, 0x1, 0x0, 0x0, 0x8004}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 707.273733] device bridge_slave_0 entered promiscuous mode [ 707.306125] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.312557] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:31 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5bd}, 0x28) [ 707.355547] device bridge_slave_0 left promiscuous mode 09:25:31 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) socket$inet6(0xa, 0x200000000007ff, 0xfffffffffffffffc) 09:25:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 707.893973] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.902597] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.908985] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'lapb0\x00', r1}) r2 = socket(0x2, 0x3, 0x5) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42004610}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x408, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x51e}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x41) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 707.946938] device bridge_slave_0 entered promiscuous mode 09:25:31 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 707.988442] device bridge_slave_0 left promiscuous mode 09:25:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5be}, 0x28) [ 708.314788] net_ratelimit: 20 callbacks suppressed [ 708.314797] protocol 88fb is buggy, dev hsr_slave_0 [ 708.324930] protocol 88fb is buggy, dev hsr_slave_1 09:25:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 708.434958] device bridge_slave_0 entered promiscuous mode 09:25:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 708.714792] protocol 88fb is buggy, dev hsr_slave_0 [ 708.719995] protocol 88fb is buggy, dev hsr_slave_1 [ 708.794742] protocol 88fb is buggy, dev hsr_slave_0 [ 708.799889] protocol 88fb is buggy, dev hsr_slave_1 [ 708.805027] protocol 88fb is buggy, dev hsr_slave_0 [ 708.810097] protocol 88fb is buggy, dev hsr_slave_1 [ 708.830383] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.839369] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.845856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.855192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 708.884778] protocol 88fb is buggy, dev hsr_slave_0 [ 708.889879] protocol 88fb is buggy, dev hsr_slave_1 09:25:32 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:32 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 708.895454] device bridge_slave_0 left promiscuous mode 09:25:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5bf}, 0x28) [ 709.155665] device bridge_slave_0 entered promiscuous mode 09:25:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:33 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 709.427681] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.438541] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.444955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 709.458735] device bridge_slave_0 left promiscuous mode 09:25:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) socketpair(0x8, 0x0, 0x8, &(0x7f00000012c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001300)={0x0, 0x9}, &(0x7f0000001340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001380)={r2}, 0x8) [ 709.872603] device bridge_slave_0 entered promiscuous mode 09:25:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c0}, 0x28) 09:25:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x5, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:33 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'lapb0\x00', r1}) r2 = socket(0x2, 0x3, 0x5) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42004610}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x408, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x51e}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x41) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 710.371317] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.381607] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.388104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.405324] device bridge_slave_0 left promiscuous mode 09:25:34 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000140)=0x3) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 710.645361] device bridge_slave_0 entered promiscuous mode [ 710.865680] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.873626] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.880056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.897794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c1}, 0x28) 09:25:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5be}, 0x28) [ 710.914540] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.920963] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 710.967349] device bridge_slave_0 left promiscuous mode 09:25:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'gretap0\x00', 0x200}) socketpair(0xb, 0x0, 0xb140, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r2, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) getsockname$netlink(r1, &(0x7f00000000c0), &(0x7f0000000140)=0xc) [ 711.253711] device bridge_slave_0 entered promiscuous mode 09:25:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) socketpair(0x8, 0x0, 0x8, &(0x7f00000012c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001300)={0x0, 0x9}, &(0x7f0000001340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001380)={r2}, 0x8) 09:25:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c2}, 0x28) 09:25:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x7, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:35 executing program 1: socket(0x800000000000a, 0x80005, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 711.608252] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.885096] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.891520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.900664] device bridge_slave_0 left promiscuous mode [ 712.102030] device bridge_slave_0 entered promiscuous mode 09:25:36 executing program 1: socket(0x800000000000a, 0x80005, 0x0) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 712.233087] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.241423] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.247906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 712.271890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:36 executing program 1: socket(0x800000000000a, 0x80005, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001080)=[{&(0x7f0000000540)=@abs, 0x10, &(0x7f0000000740), 0xab, &(0x7f0000000a80)}], 0x153, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@hopopts={0x0, 0x8, [], [@jumbo, @calipso={0x7, 0x38, {0x4, 0xc, 0x2, 0xda, [0x0, 0x9, 0x4, 0x8, 0xb9, 0x5]}}]}, 0x48) r3 = socket$packet(0x11, 0x1, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x1}) r4 = socket$inet6(0xa, 0x4, 0x3f) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000140)={r0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000480)={0x0, 0x7}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r6, 0xe00b, 0x34a}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x7, 0x2, 0x4, 0x0, 0x5}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000300)={r7, 0x3, 0x3, 0x4, 0x101, 0x400, 0x64fb, 0x7fffffff, {r8, @in6={{0xa, 0x4e24, 0x284f3c1f, @remote, 0x9}}, 0x200, 0x0, 0x40, 0x1, 0x100000000}}, &(0x7f00000003c0)=0xb0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'b\x00', 0x2000000c0ffffff}) 09:25:36 executing program 1: socket(0x800000000000a, 0x80005, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:36 executing program 1: socket(0x800000000000a, 0x80005, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:36 executing program 0: socket(0x800000000000a, 0x80005, 0x0) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 712.669428] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.678261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 712.710745] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.717213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 712.742636] device bridge_slave_0 left promiscuous mode 09:25:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) 09:25:36 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 712.999540] device bridge_slave_0 entered promiscuous mode 09:25:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:36 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x8, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:36 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c3}, 0x28) 09:25:37 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:37 executing program 1: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:37 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) [ 713.377902] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.392971] device bridge_slave_0 left promiscuous mode 09:25:37 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) 09:25:37 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) [ 713.691203] device bridge_slave_0 entered promiscuous mode 09:25:37 executing program 5: epoll_create(0x7) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socket$inet_udplite(0x2, 0x2, 0x88) 09:25:37 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 713.866361] device bridge_slave_0 left promiscuous mode 09:25:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 714.246435] device bridge_slave_0 entered promiscuous mode 09:25:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c4}, 0x28) 09:25:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x9, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:38 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04', 0x100000200}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c07fffff}) [ 714.545129] device bridge_slave_0 left promiscuous mode [ 714.554738] net_ratelimit: 20 callbacks suppressed [ 714.554746] protocol 88fb is buggy, dev hsr_slave_0 [ 714.564840] protocol 88fb is buggy, dev hsr_slave_1 09:25:38 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:25:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 714.901969] device bridge_slave_0 entered promiscuous mode [ 714.954840] protocol 88fb is buggy, dev hsr_slave_0 [ 714.960007] protocol 88fb is buggy, dev hsr_slave_1 [ 715.034771] protocol 88fb is buggy, dev hsr_slave_0 [ 715.039890] protocol 88fb is buggy, dev hsr_slave_1 [ 715.045058] protocol 88fb is buggy, dev hsr_slave_0 [ 715.050143] protocol 88fb is buggy, dev hsr_slave_1 [ 715.073893] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.082818] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.089287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.097585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.114801] protocol 88fb is buggy, dev hsr_slave_0 [ 715.119900] protocol 88fb is buggy, dev hsr_slave_1 09:25:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x533}, 0x28) [ 715.210348] device bridge_slave_0 left promiscuous mode 09:25:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xb, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c5}, 0x28) [ 715.636519] device bridge_slave_0 entered promiscuous mode [ 715.654852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.681529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:39 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 715.709985] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.716423] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x532}, 0x28) 09:25:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 715.943633] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.951785] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.958172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.976253] device bridge_slave_0 left promiscuous mode 09:25:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r0}) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000540)=0x1c, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000180)="840328f09974f66ecd6723a6a5728b71be666aac70df0b0a9faaad1896232b61709948b1e651b41988b2b2fd5706c877ad97e66bac65770eabd9b681fd72b7b985fcfc1ca3e8abaafbc0c2e5cc544460c6100548f13ca4a62dd3c5cb0f0d6b69ced0db88ce2e3fb9fb190e0d117a34bf30b032a159b7625e96c3486dcccf20ade1fe9226e75b5bc871", 0x89}], 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) sendto$rose(r2, &(0x7f00000000c0)="8add04fef663b30c517aa0a3b22e7373b57ab2cf20cb0579d90416ef0e1e2b1fb41de9ec5d98e710282faafd7d7a380b71d108db6855179f12d88d1ee01085dd8e44216f1f10452211dd6e1c8b2e8a1ecd18d63d2e5f8a671d5aeb6b26b87da4a73cb032908f10c492b6771e6a40cb558e7a59d82b417c5ff4033e884bd695f29bf4fa01cc29b82c5926a5e39d5174cb697cc61ebae5bfb17670ff42e2d98a9359ededf734d4ebda1f50dab2e4a445", 0xaf, 0x8080, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, 0x1c) 09:25:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:40 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c6}, 0x28) [ 716.262176] device bridge_slave_0 entered promiscuous mode 09:25:40 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 716.590550] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.601363] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.607816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.621470] device bridge_slave_0 left promiscuous mode 09:25:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x11, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c7}, 0x28) [ 717.366410] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.385126] device bridge_slave_0 entered promiscuous mode [ 717.391726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 717.399580] device bridge_slave_0 left promiscuous mode 09:25:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept(r0, &(0x7f0000000800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000880)=0x80) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'team_slave_1\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xd, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x52a}, 0x28) [ 717.738274] device bridge_slave_0 entered promiscuous mode 09:25:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x14, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:41 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:41 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c8}, 0x28) [ 718.105452] device bridge_slave_0 left promiscuous mode 09:25:42 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 718.363199] device bridge_slave_0 entered promiscuous mode [ 718.380128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 718.390586] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.397123] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1c, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) r1 = accept$ax25(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) recvfrom$ax25(r1, &(0x7f00000000c0)=""/233, 0xe9, 0x40000103, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r1}) bind$alg(r2, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ce\x00'}, 0x58) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5c9}, 0x28) [ 718.782979] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.801023] device bridge_slave_0 left promiscuous mode 09:25:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x51d}, 0x28) 09:25:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x21, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 719.085350] device bridge_slave_0 entered promiscuous mode 09:25:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:43 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) 09:25:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 719.400441] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.415476] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.421859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 719.432081] device bridge_slave_0 left promiscuous mode [ 719.668520] device bridge_slave_0 entered promiscuous mode 09:25:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x29, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 719.858164] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.870274] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.876727] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) getpeername(r0, &(0x7f0000000000)=@ll, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) 09:25:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ca}, 0x28) 09:25:43 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) socket$inet(0x2, 0x0, 0x0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00'}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000200)) [ 720.164370] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.173372] device bridge_slave_0 left promiscuous mode 09:25:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 720.405000] device bridge_slave_0 entered promiscuous mode 09:25:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2b, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 720.668809] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.677084] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.683565] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 720.794742] net_ratelimit: 20 callbacks suppressed [ 720.794752] protocol 88fb is buggy, dev hsr_slave_0 [ 720.805414] protocol 88fb is buggy, dev hsr_slave_1 09:25:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 720.882778] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.896805] device bridge_slave_0 left promiscuous mode [ 721.128769] device bridge_slave_0 entered promiscuous mode [ 721.195879] protocol 88fb is buggy, dev hsr_slave_0 [ 721.200980] protocol 88fb is buggy, dev hsr_slave_1 [ 721.274791] protocol 88fb is buggy, dev hsr_slave_0 [ 721.280003] protocol 88fb is buggy, dev hsr_slave_1 [ 721.285212] protocol 88fb is buggy, dev hsr_slave_0 [ 721.290311] protocol 88fb is buggy, dev hsr_slave_1 09:25:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5cb}, 0x28) [ 721.323557] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.331882] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.338296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.354759] protocol 88fb is buggy, dev hsr_slave_0 [ 721.359908] protocol 88fb is buggy, dev hsr_slave_1 09:25:45 executing program 5: r0 = socket$packet(0x11, 0xd, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x10) socketpair(0x8, 0x7, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140)=0xffffffffffffff37, 0x4) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x3, @random="f5cefd6c36e9", 'veth1_to_bond\x00'}}, 0x1e) 09:25:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$inet(0x2, 0x6, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) bind$bt_sco(r1, &(0x7f0000001740)={0x1f, {0x8, 0xfffffffffffffffa, 0xa38, 0x3, 0x3, 0x20d7}}, 0x8) 09:25:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 721.606489] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.614146] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.620575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.629451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.638735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2c, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 721.821936] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.845864] device bridge_slave_0 left promiscuous mode 09:25:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5cc}, 0x28) [ 722.089979] device bridge_slave_0 entered promiscuous mode 09:25:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 722.369846] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.378290] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.384732] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 722.522157] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.529625] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.536047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.542943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 722.551743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 722.716056] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.728346] device bridge_slave_0 left promiscuous mode [ 722.989972] device bridge_slave_0 entered promiscuous mode [ 723.189450] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.198135] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.204544] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x2f, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5cd}, 0x28) 09:25:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$inet(0x2, 0x6, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) bind$bt_sco(r1, &(0x7f0000001740)={0x1f, {0x8, 0xfffffffffffffffa, 0xa38, 0x3, 0x3, 0x20d7}}, 0x8) [ 723.420099] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.427800] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.434176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.441660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 723.451027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) getpeername(r0, &(0x7f0000000000)=@ll, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) [ 723.671145] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.681229] device bridge_slave_0 left promiscuous mode [ 723.902249] device bridge_slave_0 entered promiscuous mode 09:25:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 724.135732] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.144303] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.150751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.288475] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.296116] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.302564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.309654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.318571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) getpeername(r0, &(0x7f0000000000)=@ll, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) 09:25:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x517}, 0x28) [ 724.496609] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.511764] device bridge_slave_0 left promiscuous mode [ 724.750585] device bridge_slave_0 entered promiscuous mode 09:25:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5ce}, 0x28) 09:25:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x32, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 724.933586] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept4(r0, &(0x7f0000000000)=@un=@abs, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x90e6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x800, 0x30}, 0xc) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) [ 725.162075] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.170721] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.177145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.184234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.193419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 725.213643] device bridge_slave_0 left promiscuous mode 09:25:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50e}, 0x28) [ 725.486595] device bridge_slave_0 entered promiscuous mode 09:25:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x33, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5cf}, 0x28) [ 725.711083] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.719580] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.726022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.733100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.742123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x50c}, 0x28) 09:25:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r0}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000000c0)={r0, 0xa, 0x5d3, "17eea9db8f04469efaf09968977a38350239811fb7a78e672f7d97f0c30ae502b7449824c8c7cb894d4fc9725b9c9cdb4aceb895e857c8d3c37e52fc0dc17ebca9855b1b14a514d7a66b3085d1f3040284dee23f3ed4bf8df5bf319daa1b88d944c4df121d2c8d425d5cbb84c7df7aef3b5dc58651721618fe6e9378279379b632d847a6f7d66a5e1aaafc36dd622e2b7d14d378432bcc7804ce045a8377377f9df8b281a172752df33e867b6c5e346c6e11ac4a4e03d8f33fc100228118543654f38a8697920cdde9cfedaf3c3b05142480b4e2c9e44d98b66698992394c282750c6c6d3d13d3547c87df648e7481f6c4750f0596c3da3b00adfa"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 725.998344] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.006313] device bridge_slave_0 left promiscuous mode 09:25:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 726.205946] device bridge_slave_0 entered promiscuous mode [ 726.221135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 726.243404] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.249840] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x503}, 0x28) 09:25:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3a, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 726.282010] device bridge_slave_0 left promiscuous mode 09:25:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d0}, 0x28) 09:25:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 726.729355] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.736795] device bridge_slave_0 entered promiscuous mode [ 726.744301] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.750694] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) gettid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d1}, 0x28) [ 726.968113] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.990061] device bridge_slave_0 left promiscuous mode 09:25:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3c, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:50 executing program 0: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 727.034738] net_ratelimit: 20 callbacks suppressed [ 727.034747] protocol 88fb is buggy, dev hsr_slave_0 [ 727.039806] protocol 88fb is buggy, dev hsr_slave_1 09:25:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4ff}, 0x28) [ 727.434786] protocol 88fb is buggy, dev hsr_slave_0 [ 727.440026] protocol 88fb is buggy, dev hsr_slave_1 [ 727.514833] protocol 88fb is buggy, dev hsr_slave_0 [ 727.520095] protocol 88fb is buggy, dev hsr_slave_1 [ 727.525249] protocol 88fb is buggy, dev hsr_slave_0 [ 727.530346] protocol 88fb is buggy, dev hsr_slave_1 [ 727.562672] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.570230] device bridge_slave_0 entered promiscuous mode [ 727.579746] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.586218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.594758] protocol 88fb is buggy, dev hsr_slave_0 [ 727.599840] protocol 88fb is buggy, dev hsr_slave_1 09:25:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x6c, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 727.725841] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.734317] device bridge_slave_0 left promiscuous mode 09:25:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x4fe}, 0x28) 09:25:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d2}, 0x28) 09:25:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xf0, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:52 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x40049409, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) [ 728.259833] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x8000000001000}) 09:25:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 728.353593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 728.369703] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.376212] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d3}, 0x28) 09:25:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 728.643160] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.650422] device bridge_slave_0 entered promiscuous mode [ 728.667167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 728.678250] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.684752] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 728.695685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x300, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 729.112651] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.125775] device bridge_slave_0 left promiscuous mode 09:25:53 executing program 1: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890d, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bri\x81\xed\x00\x00\x00\x00\x00\x00e_0\x00?', 0x2000000c0ffffff}) 09:25:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 729.427329] device bridge_slave_0 entered promiscuous mode [ 729.447805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d4}, 0x28) 09:25:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 729.628320] bridge0: port 1(bridge_slave_0) entered disabled state 09:25:53 executing program 5: r0 = socket$packet(0x11, 0x8, 0x300) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x3d8) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000006c0)=0x81, 0x4) [ 729.899991] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.908839] device bridge_slave_0 left promiscuous mode 09:25:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x8c, r2, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffff80}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x714}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1a1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4840}, 0xc0c4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) r3 = accept(r1, &(0x7f0000000000)=@l2, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x2, 0x2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000180)={r4, 0x8}, 0x8) 09:25:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x500, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 730.150348] device bridge_slave_0 entered promiscuous mode [ 730.162936] device bridge_slave_0 left promiscuous mode 09:25:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d5}, 0x28) 09:25:54 executing program 0: r0 = socket(0x800000000000a, 0x80005, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5421, &(0x7f0000000280)={'bridge_slave_0\x00\x04', 0xfffffffffffffffe}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000500)=0x3) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x20000000000800, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x5}}, 0x7, 0x401, 0x401, 0x6, 0x6}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @loopback}, 0x89}}, [0xffff, 0x1f, 0x7, 0xffffffff, 0x401, 0x8, 0xf04, 0x5, 0x200, 0x80000000, 0x7, 0x7fffffff, 0x4f2, 0x3, 0x488]}, &(0x7f0000000740)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) 09:25:54 executing program 0 (fault-call:1 fault-nth:0): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 730.614205] FAULT_INJECTION: forcing a failure. [ 730.614205] name failslab, interval 1, probability 0, space 0, times 0 [ 730.625500] CPU: 1 PID: 14688 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 730.632781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.642137] Call Trace: [ 730.644740] dump_stack+0x172/0x1f0 [ 730.644829] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.648384] should_fail.cold+0xa/0x1b [ 730.648407] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 730.648429] ? __mutex_lock+0x3cd/0x1310 [ 730.648458] __should_failslab+0x121/0x190 [ 730.648479] should_failslab+0x9/0x14 [ 730.648496] kmem_cache_alloc+0x47/0x710 [ 730.648518] ? mark_held_locks+0x100/0x100 [ 730.648542] __build_skb+0x3e/0x310 [ 730.687754] __napi_alloc_skb+0x1d2/0x300 [ 730.691918] napi_get_frags+0x65/0x140 [ 730.695805] tun_get_user+0xef5/0x38d0 [ 730.699690] ? mark_held_locks+0x100/0x100 [ 730.703938] ? tun_build_skb.isra.0+0x1150/0x1150 [ 730.708780] ? tun_get+0x171/0x290 [ 730.712323] ? lock_downgrade+0x810/0x810 [ 730.716474] ? kasan_check_read+0x11/0x20 [ 730.720638] tun_chr_write_iter+0xbd/0x160 [ 730.724867] do_iter_readv_writev+0x5e0/0x8e0 [ 730.729350] ? vfs_dedupe_file_range+0x780/0x780 [ 730.734092] ? apparmor_file_permission+0x25/0x30 [ 730.738928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 730.744452] ? rw_verify_area+0x118/0x360 [ 730.748585] do_iter_write+0x184/0x610 [ 730.752459] ? dup_iter+0x260/0x260 [ 730.756093] vfs_writev+0x1b3/0x2f0 [ 730.759746] ? vfs_iter_write+0xb0/0xb0 [ 730.763734] ? kasan_check_read+0x11/0x20 [ 730.767888] ? iterate_fd+0x360/0x360 [ 730.771679] ? check_preemption_disabled+0x48/0x290 [ 730.776696] ? wait_for_completion+0x440/0x440 [ 730.781292] ? __fget_light+0x1a9/0x230 [ 730.785293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.790817] do_writev+0xf6/0x290 [ 730.794266] ? vfs_writev+0x2f0/0x2f0 [ 730.798066] ? do_syscall_64+0x26/0x610 [ 730.802073] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.807432] ? do_syscall_64+0x26/0x610 [ 730.811536] __x64_sys_writev+0x75/0xb0 [ 730.815513] do_syscall_64+0x103/0x610 [ 730.819414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.824607] RIP: 0033:0x457cf1 [ 730.827824] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 730.846728] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 730.854434] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 730.861696] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 730.868959] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 730.876220] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 730.883492] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 [ 730.898058] device bridge_slave_0 entered promiscuous mode [ 730.906356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 09:25:54 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) [ 730.917991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 730.926136] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.932560] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x1000}) 09:25:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d6}, 0x28) 09:25:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x543, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:54 executing program 0 (fault-call:1 fault-nth:1): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 731.121396] FAULT_INJECTION: forcing a failure. [ 731.121396] name failslab, interval 1, probability 0, space 0, times 0 [ 731.133819] CPU: 0 PID: 14707 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 731.141109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.150459] Call Trace: [ 731.153058] dump_stack+0x172/0x1f0 [ 731.156705] should_fail.cold+0xa/0x1b [ 731.160605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.165716] ? lock_acquire+0x16f/0x3f0 [ 731.169697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.175238] ? should_fail+0x14d/0x85c [ 731.179163] __should_failslab+0x121/0x190 [ 731.183410] should_failslab+0x9/0x14 [ 731.187219] kmem_cache_alloc_node_trace+0x5a/0x720 [ 731.192270] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 731.197747] __kmalloc_node_track_caller+0x3d/0x70 [ 731.202688] __kmalloc_reserve.isra.0+0x40/0xf0 [ 731.207384] pskb_expand_head+0x14e/0xdd0 [ 731.211540] ? lockdep_hardirqs_on+0x415/0x5d0 [ 731.216133] ? tun_get_user+0xecc/0x38d0 [ 731.220197] ? trace_hardirqs_on+0x67/0x230 [ 731.224529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.230074] tun_get_user+0x1e1e/0x38d0 [ 731.234082] ? mark_held_locks+0x100/0x100 [ 731.238363] ? tun_build_skb.isra.0+0x1150/0x1150 [ 731.243209] ? tun_get+0x171/0x290 [ 731.246781] ? lock_downgrade+0x810/0x810 [ 731.250935] ? kasan_check_read+0x11/0x20 [ 731.255097] tun_chr_write_iter+0xbd/0x160 [ 731.259367] do_iter_readv_writev+0x5e0/0x8e0 [ 731.263891] ? vfs_dedupe_file_range+0x780/0x780 [ 731.268657] ? apparmor_file_permission+0x25/0x30 [ 731.273510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.279056] ? rw_verify_area+0x118/0x360 [ 731.283210] do_iter_write+0x184/0x610 [ 731.287130] ? dup_iter+0x260/0x260 [ 731.290846] vfs_writev+0x1b3/0x2f0 [ 731.294498] ? vfs_iter_write+0xb0/0xb0 [ 731.298493] ? kasan_check_read+0x11/0x20 [ 731.302663] ? iterate_fd+0x360/0x360 [ 731.306466] ? check_preemption_disabled+0x48/0x290 [ 731.311487] ? wait_for_completion+0x440/0x440 [ 731.316089] ? __fget_light+0x1a9/0x230 [ 731.320075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.325611] do_writev+0xf6/0x290 [ 731.329068] ? vfs_writev+0x2f0/0x2f0 [ 731.332884] ? do_syscall_64+0x26/0x610 [ 731.336855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.342229] ? do_syscall_64+0x26/0x610 [ 731.346237] __x64_sys_writev+0x75/0xb0 [ 731.350255] do_syscall_64+0x103/0x610 [ 731.354173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.359375] RIP: 0033:0x457cf1 [ 731.362572] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 731.381473] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 731.389185] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 731.396457] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 731.403721] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 731.410991] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 731.418265] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 09:25:55 executing program 0 (fault-call:1 fault-nth:2): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 731.468871] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.479550] FAULT_INJECTION: forcing a failure. [ 731.479550] name failslab, interval 1, probability 0, space 0, times 0 [ 731.499641] CPU: 1 PID: 14692 Comm: syz-executor.1 Not tainted 5.0.0-rc5+ #69 [ 731.506938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.516288] Call Trace: [ 731.518874] dump_stack+0x172/0x1f0 [ 731.522508] should_fail.cold+0xa/0x1b [ 731.526396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.531499] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 731.536878] ? find_held_lock+0x35/0x130 [ 731.537018] FAULT_INJECTION: forcing a failure. [ 731.537018] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 731.540952] __should_failslab+0x121/0x190 [ 731.556960] should_failslab+0x9/0x14 [ 731.560762] kmem_cache_alloc_node+0x56/0x710 [ 731.565275] __alloc_skb+0xd5/0x5e0 [ 731.568907] ? skb_scrub_packet+0x440/0x440 [ 731.573233] ? if_nlmsg_size+0x4b8/0xa00 [ 731.577313] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 731.581902] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 731.586661] rtmsg_ifinfo+0x8d/0xa0 [ 731.590291] __dev_notify_flags+0x235/0x2c0 [ 731.594612] ? dev_change_name+0xa20/0xa20 [ 731.598845] ? __dev_change_flags+0x513/0x6e0 [ 731.603342] ? dev_set_allmulti+0x30/0x30 [ 731.607490] ? __lock_is_held+0xb6/0x140 [ 731.611565] dev_change_flags+0x10d/0x170 [ 731.615731] devinet_ioctl+0x1396/0x1c60 [ 731.619816] ? _copy_from_user+0xdd/0x150 [ 731.624317] inet_ioctl+0x1fc/0x370 [ 731.627945] ? __lock_acquire+0x53b/0x4700 [ 731.632358] ? inet_stream_connect+0xa0/0xa0 [ 731.636767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.642320] ? mark_held_locks+0x100/0x100 [ 731.646555] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 731.651576] ? kstrtouint+0x142/0x1a0 [ 731.655380] ? _kstrtoul+0x170/0x170 [ 731.659098] ? get_pid_task+0xd4/0x190 [ 731.662989] packet_ioctl+0xcb/0x2b0 [ 731.666714] sock_do_ioctl+0xde/0x300 [ 731.670519] ? compat_ifr_data_ioctl+0x160/0x160 [ 731.675289] ? kasan_check_read+0x11/0x20 [ 731.679446] ? mark_held_locks+0x100/0x100 [ 731.683685] sock_ioctl+0x32b/0x610 [ 731.687313] ? dlci_ioctl_set+0x40/0x40 [ 731.691289] ? __fget+0x340/0x540 [ 731.694741] ? find_held_lock+0x35/0x130 [ 731.698815] ? __fget+0x340/0x540 [ 731.702275] ? dlci_ioctl_set+0x40/0x40 [ 731.706262] do_vfs_ioctl+0xd6e/0x1390 [ 731.710157] ? ioctl_preallocate+0x210/0x210 [ 731.714565] ? __fget+0x367/0x540 [ 731.718028] ? iterate_fd+0x360/0x360 [ 731.721833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.727377] ? fput+0x128/0x1a0 [ 731.730667] ? security_file_ioctl+0x93/0xc0 [ 731.735082] ksys_ioctl+0xab/0xd0 [ 731.738539] __x64_sys_ioctl+0x73/0xb0 [ 731.742451] do_syscall_64+0x103/0x610 [ 731.746348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.751534] RIP: 0033:0x457e39 [ 731.754728] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.773627] RSP: 002b:00007f8de65e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 731.781336] RAX: ffffffffffffffda RBX: 00007f8de65e2c90 RCX: 0000000000457e39 [ 731.788599] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000003 [ 731.795866] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 731.803147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8de65e36d4 [ 731.810416] R13: 00000000004c34e6 R14: 00000000004d6250 R15: 0000000000000004 [ 731.817715] CPU: 0 PID: 14714 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 731.824994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.834341] Call Trace: [ 731.836974] dump_stack+0x172/0x1f0 [ 731.840618] should_fail.cold+0xa/0x1b [ 731.844510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.849618] ? save_stack+0x45/0xd0 [ 731.853263] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 731.858371] ? kasan_slab_alloc+0xf/0x20 [ 731.862432] ? kmem_cache_alloc+0x12d/0x710 [ 731.866753] ? __build_skb+0x3e/0x310 [ 731.870539] ? __napi_alloc_skb+0x1d2/0x300 [ 731.874857] should_fail_alloc_page+0x50/0x60 [ 731.879364] __alloc_pages_nodemask+0x1a1/0x710 [ 731.884040] ? mark_held_locks+0x100/0x100 [ 731.888293] ? __alloc_pages_slowpath+0x2900/0x2900 [ 731.893335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.898445] cache_grow_begin+0x9c/0x8c0 [ 731.902549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.908108] ? check_preemption_disabled+0x48/0x290 [ 731.913130] kmem_cache_alloc_node_trace+0x658/0x720 [ 731.918277] __kmalloc_node_track_caller+0x3d/0x70 [ 731.923214] __kmalloc_reserve.isra.0+0x40/0xf0 [ 731.927901] pskb_expand_head+0x14e/0xdd0 [ 731.932051] ? lockdep_hardirqs_on+0x415/0x5d0 [ 731.936650] ? tun_get_user+0xecc/0x38d0 [ 731.940711] ? trace_hardirqs_on+0x67/0x230 [ 731.945044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.950590] tun_get_user+0x1e1e/0x38d0 [ 731.954566] ? mark_held_locks+0x100/0x100 [ 731.958819] ? tun_build_skb.isra.0+0x1150/0x1150 [ 731.963661] ? tun_get+0x171/0x290 [ 731.967242] ? lock_downgrade+0x810/0x810 [ 731.971411] ? kasan_check_read+0x11/0x20 [ 731.975606] tun_chr_write_iter+0xbd/0x160 [ 731.979862] do_iter_readv_writev+0x5e0/0x8e0 [ 731.984365] ? vfs_dedupe_file_range+0x780/0x780 [ 731.989126] ? apparmor_file_permission+0x25/0x30 [ 731.993973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.999530] ? rw_verify_area+0x118/0x360 [ 732.003703] do_iter_write+0x184/0x610 [ 732.007592] ? dup_iter+0x260/0x260 [ 732.011269] vfs_writev+0x1b3/0x2f0 [ 732.014909] ? vfs_iter_write+0xb0/0xb0 [ 732.018886] ? kasan_check_read+0x11/0x20 [ 732.023047] ? iterate_fd+0x360/0x360 [ 732.026848] ? check_preemption_disabled+0x48/0x290 [ 732.031871] ? wait_for_completion+0x440/0x440 [ 732.036478] ? __fget_light+0x1a9/0x230 [ 732.040470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.046026] do_writev+0xf6/0x290 [ 732.049487] ? vfs_writev+0x2f0/0x2f0 [ 732.053296] ? do_syscall_64+0x26/0x610 [ 732.057285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.062648] ? do_syscall_64+0x26/0x610 [ 732.066626] __x64_sys_writev+0x75/0xb0 [ 732.070608] do_syscall_64+0x103/0x610 [ 732.074504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.079700] RIP: 0033:0x457cf1 [ 732.082920] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 732.101839] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 732.109546] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 732.117766] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 732.125031] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 732.132297] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 732.139593] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 [ 732.147528] net_ratelimit: 18 callbacks suppressed [ 732.147538] protocol 88fb is buggy, dev hsr_slave_0 [ 732.157628] protocol 88fb is buggy, dev hsr_slave_1 09:25:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:56 executing program 0 (fault-call:1 fault-nth:3): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 732.293759] FAULT_INJECTION: forcing a failure. [ 732.293759] name failslab, interval 1, probability 0, space 0, times 0 [ 732.311033] CPU: 1 PID: 14725 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 732.318325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.327679] Call Trace: [ 732.330292] dump_stack+0x172/0x1f0 [ 732.333931] should_fail.cold+0xa/0x1b [ 732.337828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.342938] ? lock_downgrade+0x810/0x810 [ 732.347093] ? ___might_sleep+0x163/0x280 [ 732.351519] __should_failslab+0x121/0x190 [ 732.355763] should_failslab+0x9/0x14 [ 732.359567] kmem_cache_alloc+0x2be/0x710 [ 732.363727] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.369287] ptlock_alloc+0x20/0x70 [ 732.372923] pte_alloc_one+0x6d/0x1a0 [ 732.376733] do_huge_pmd_anonymous_page+0xa7a/0x1570 [ 732.381842] ? __lock_acquire+0x53b/0x4700 [ 732.386086] ? __thp_get_unmapped_area+0x190/0x190 [ 732.391026] ? pmd_val+0x100/0x100 [ 732.394589] __handle_mm_fault+0x2daf/0x3f20 [ 732.399015] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 732.403860] ? find_held_lock+0x35/0x130 [ 732.407970] ? handle_mm_fault+0x322/0xb30 [ 732.412222] ? kasan_check_read+0x11/0x20 [ 732.416388] handle_mm_fault+0x43f/0xb30 [ 732.420463] __do_page_fault+0x5da/0xd60 [ 732.424541] do_page_fault+0x71/0x581 [ 732.428352] page_fault+0x1e/0x30 [ 732.431808] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 732.437697] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 732.456600] RSP: 0018:ffff888063637778 EFLAGS: 00010206 [ 732.461963] RAX: ffffed100a1423b2 RBX: 0000000000211d49 RCX: 0000000000011d49 [ 732.463256] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.469229] RDX: 0000000000211d49 RSI: 0000000020200000 RDI: ffff888050a00040 [ 732.482870] RBP: ffff8880636377b0 R08: ffffed100a1423b2 R09: 0000000000000002 [ 732.490398] R10: ffffed100a1423b1 R11: ffff888050a11d88 R12: 0000000020000000 [ 732.497661] R13: ffff888050800040 R14: 0000000020211d49 R15: 00007ffffffff000 [ 732.504932] ? copyin+0xe2/0x100 [ 732.508289] _copy_from_iter+0x211/0xba0 [ 732.512340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.517865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.523415] ? __phys_addr_symbol+0x30/0x70 [ 732.527720] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 732.532729] skb_copy_datagram_from_iter+0x107/0x660 [ 732.537830] ? trace_hardirqs_on+0x67/0x230 [ 732.542143] tun_get_user+0x1ed9/0x38d0 [ 732.546101] ? mark_held_locks+0x100/0x100 [ 732.550327] ? tun_build_skb.isra.0+0x1150/0x1150 [ 732.555152] ? tun_get+0x171/0x290 [ 732.558680] ? lock_downgrade+0x810/0x810 [ 732.562818] ? kasan_check_read+0x11/0x20 [ 732.566968] tun_chr_write_iter+0xbd/0x160 [ 732.571196] do_iter_readv_writev+0x5e0/0x8e0 [ 732.575679] ? vfs_dedupe_file_range+0x780/0x780 [ 732.580434] ? apparmor_file_permission+0x25/0x30 [ 732.585281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.590802] ? rw_verify_area+0x118/0x360 [ 732.594935] do_iter_write+0x184/0x610 [ 732.598810] ? dup_iter+0x260/0x260 [ 732.602428] vfs_writev+0x1b3/0x2f0 [ 732.606039] ? vfs_iter_write+0xb0/0xb0 [ 732.609999] ? kasan_check_read+0x11/0x20 [ 732.614142] ? iterate_fd+0x360/0x360 [ 732.617956] ? check_preemption_disabled+0x48/0x290 [ 732.622964] ? wait_for_completion+0x440/0x440 [ 732.627533] ? __fget_light+0x1a9/0x230 [ 732.631506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.637034] do_writev+0xf6/0x290 [ 732.640481] ? vfs_writev+0x2f0/0x2f0 [ 732.644284] ? do_syscall_64+0x26/0x610 [ 732.648266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.653629] ? do_syscall_64+0x26/0x610 [ 732.657592] __x64_sys_writev+0x75/0xb0 [ 732.661553] do_syscall_64+0x103/0x610 [ 732.665428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.670601] RIP: 0033:0x457cf1 [ 732.673781] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 732.692683] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 732.700375] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 732.707633] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 732.714897] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 732.722149] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 732.729402] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 09:25:56 executing program 0 (fault-call:1 fault-nth:4): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 732.744734] device bridge_slave_0 left promiscuous mode [ 732.810758] FAULT_INJECTION: forcing a failure. [ 732.810758] name failslab, interval 1, probability 0, space 0, times 0 [ 732.824950] CPU: 0 PID: 14729 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 732.832254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.841613] Call Trace: [ 732.844227] dump_stack+0x172/0x1f0 [ 732.847879] should_fail.cold+0xa/0x1b [ 732.851829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.856975] ? lock_downgrade+0x810/0x810 [ 732.861220] ? ___might_sleep+0x163/0x280 [ 732.865389] __should_failslab+0x121/0x190 [ 732.869652] should_failslab+0x9/0x14 [ 732.873462] kmem_cache_alloc+0x2be/0x710 [ 732.877619] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.883167] ptlock_alloc+0x20/0x70 [ 732.886802] pte_alloc_one+0x6d/0x1a0 [ 732.890627] do_huge_pmd_anonymous_page+0xa7a/0x1570 [ 732.895757] ? __lock_acquire+0x53b/0x4700 [ 732.900008] ? __thp_get_unmapped_area+0x190/0x190 [ 732.904944] ? pmd_val+0x100/0x100 [ 732.908496] __handle_mm_fault+0x2daf/0x3f20 [ 732.912921] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 732.917782] ? find_held_lock+0x35/0x130 [ 732.921864] ? handle_mm_fault+0x322/0xb30 [ 732.926117] ? kasan_check_read+0x11/0x20 [ 732.930289] handle_mm_fault+0x43f/0xb30 [ 732.934368] __do_page_fault+0x5da/0xd60 [ 732.938444] do_page_fault+0x71/0x581 [ 732.942272] page_fault+0x1e/0x30 [ 732.945735] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 732.951652] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 732.970572] RSP: 0018:ffff888063637778 EFLAGS: 00010206 [ 732.975942] RAX: ffffed100a0423b2 RBX: 0000000000211d49 RCX: 0000000000011d49 [ 732.983211] RDX: 0000000000211d49 RSI: 0000000020200000 RDI: ffff888050200040 [ 732.990481] RBP: ffff8880636377b0 R08: ffffed100a0423b2 R09: 0000000000000002 [ 732.997762] R10: ffffed100a0423b1 R11: ffff888050211d88 R12: 0000000020000000 [ 733.005045] R13: ffff888050000040 R14: 0000000020211d49 R15: 00007ffffffff000 [ 733.012407] ? copyin+0xe2/0x100 [ 733.015804] _copy_from_iter+0x211/0xba0 [ 733.019875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.025418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.030961] ? __phys_addr_symbol+0x30/0x70 [ 733.035290] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 733.040323] skb_copy_datagram_from_iter+0x107/0x660 [ 733.045435] ? trace_hardirqs_on+0x67/0x230 [ 733.049772] tun_get_user+0x1ed9/0x38d0 [ 733.053757] ? mark_held_locks+0x100/0x100 [ 733.058008] ? tun_build_skb.isra.0+0x1150/0x1150 [ 733.062853] ? tun_get+0x171/0x290 [ 733.066444] ? lock_downgrade+0x810/0x810 [ 733.070606] ? kasan_check_read+0x11/0x20 [ 733.074769] tun_chr_write_iter+0xbd/0x160 [ 733.079014] do_iter_readv_writev+0x5e0/0x8e0 [ 733.083532] ? vfs_dedupe_file_range+0x780/0x780 [ 733.088295] ? apparmor_file_permission+0x25/0x30 [ 733.093153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.098709] ? rw_verify_area+0x118/0x360 [ 733.102865] do_iter_write+0x184/0x610 [ 733.106755] ? dup_iter+0x260/0x260 [ 733.110407] vfs_writev+0x1b3/0x2f0 [ 733.114052] ? vfs_iter_write+0xb0/0xb0 [ 733.118031] ? kasan_check_read+0x11/0x20 [ 733.121283] device bridge_slave_0 entered promiscuous mode [ 733.122194] ? iterate_fd+0x360/0x360 [ 733.122213] ? check_preemption_disabled+0x48/0x290 [ 733.122233] ? wait_for_completion+0x440/0x440 [ 733.122265] ? __fget_light+0x1a9/0x230 [ 733.145238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.150789] do_writev+0xf6/0x290 [ 733.154231] ? vfs_writev+0x2f0/0x2f0 [ 733.158043] ? do_syscall_64+0x26/0x610 [ 733.162021] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.167381] ? do_syscall_64+0x26/0x610 [ 733.171360] __x64_sys_writev+0x75/0xb0 [ 733.175336] do_syscall_64+0x103/0x610 [ 733.179233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.184425] RIP: 0033:0x457cf1 [ 733.187618] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 733.206527] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 733.214242] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 733.221521] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 733.228794] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 733.236067] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 733.243338] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 [ 733.252400] device bridge_slave_0 left promiscuous mode 09:25:57 executing program 0 (fault-call:1 fault-nth:5): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 733.274721] protocol 88fb is buggy, dev hsr_slave_0 [ 733.279905] protocol 88fb is buggy, dev hsr_slave_1 [ 733.340741] FAULT_INJECTION: forcing a failure. [ 733.340741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 733.352781] CPU: 1 PID: 14732 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 733.360057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.369410] Call Trace: [ 733.372018] dump_stack+0x172/0x1f0 [ 733.375657] should_fail.cold+0xa/0x1b [ 733.379567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.384691] ? find_held_lock+0x35/0x130 [ 733.388758] ? __skb_flow_dissect+0x9fa/0x4ed0 [ 733.393349] should_fail_alloc_page+0x50/0x60 [ 733.397845] __alloc_pages_nodemask+0x1a1/0x710 [ 733.402519] ? lock_downgrade+0x810/0x810 [ 733.406671] ? __alloc_pages_slowpath+0x2900/0x2900 [ 733.411692] ? kasan_check_read+0x11/0x20 [ 733.415849] ? __skb_flow_dissect+0x950/0x4ed0 [ 733.420434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.425547] cache_grow_begin+0x9c/0x8c0 [ 733.429611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.435151] ? check_preemption_disabled+0x48/0x290 [ 733.440172] kmem_cache_alloc+0x645/0x710 [ 733.444329] skb_ext_add+0x4a2/0x640 [ 733.448045] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 733.453254] secpath_set+0xfe/0x1c0 [ 733.456888] esp6_gro_receive+0x593/0xd40 [ 733.461045] ? __lock_acquire+0x53b/0x4700 [ 733.465291] ? esp6_xmit+0xde0/0xde0 [ 733.469036] ? __lock_is_held+0xb6/0x140 [ 733.473096] ? check_preemption_disabled+0x48/0x290 [ 733.478121] ? esp6_xmit+0xde0/0xde0 [ 733.481840] ipv6_gro_receive+0x125b/0x1550 [ 733.486172] ? ipv6_gso_pull_exthdrs+0x4a0/0x4a0 [ 733.490947] dev_gro_receive+0xfe0/0x23b0 [ 733.495092] ? __lock_is_held+0xb6/0x140 [ 733.499179] ? check_preemption_disabled+0x48/0x290 [ 733.504205] napi_gro_frags+0x36b/0xd10 [ 733.508191] tun_get_user+0x2832/0x38d0 [ 733.512167] ? mark_held_locks+0x100/0x100 [ 733.516423] ? tun_build_skb.isra.0+0x1150/0x1150 [ 733.521272] ? tun_get+0x171/0x290 [ 733.524823] ? lock_downgrade+0x810/0x810 [ 733.528980] ? kasan_check_read+0x11/0x20 [ 733.533154] tun_chr_write_iter+0xbd/0x160 [ 733.537396] do_iter_readv_writev+0x5e0/0x8e0 [ 733.541905] ? vfs_dedupe_file_range+0x780/0x780 [ 733.546659] ? apparmor_file_permission+0x25/0x30 [ 733.551487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 733.557015] ? rw_verify_area+0x118/0x360 [ 733.561148] do_iter_write+0x184/0x610 [ 733.565023] ? dup_iter+0x260/0x260 [ 733.568635] vfs_writev+0x1b3/0x2f0 [ 733.572272] ? vfs_iter_write+0xb0/0xb0 [ 733.576253] ? kasan_check_read+0x11/0x20 [ 733.580389] ? iterate_fd+0x360/0x360 [ 733.584191] ? check_preemption_disabled+0x48/0x290 [ 733.589195] ? wait_for_completion+0x440/0x440 [ 733.593776] ? __fget_light+0x1a9/0x230 [ 733.597772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.603306] do_writev+0xf6/0x290 [ 733.606755] ? vfs_writev+0x2f0/0x2f0 [ 733.610538] ? do_syscall_64+0x26/0x610 [ 733.614496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.619842] ? do_syscall_64+0x26/0x610 [ 733.623801] __x64_sys_writev+0x75/0xb0 [ 733.627780] do_syscall_64+0x103/0x610 [ 733.631810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 733.636980] RIP: 0033:0x457cf1 [ 733.640157] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 733.659038] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 733.666729] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 733.673995] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 733.681266] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 09:25:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair(0xa, 0x1, 0x71a3294b, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000540)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x600, 0x0, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 09:25:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0, 0x5d7}, 0x28) [ 733.688517] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 733.695768] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 09:25:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00\x04'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 09:25:57 executing program 0 (fault-call:1 fault-nth:6): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x8, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x3005ca, 0x8932, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 733.834741] protocol 88fb is buggy, dev hsr_slave_0 [ 733.839941] protocol 88fb is buggy, dev hsr_slave_1 [ 733.845144] protocol 88fb is buggy, dev hsr_slave_0 [ 733.850222] protocol 88fb is buggy, dev hsr_slave_1 [ 733.855403] protocol 88fb is buggy, dev hsr_slave_0 [ 733.860479] protocol 88fb is buggy, dev hsr_slave_1 [ 733.901742] FAULT_INJECTION: forcing a failure. [ 733.901742] name failslab, interval 1, probability 0, space 0, times 0 [ 733.913064] CPU: 0 PID: 14750 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 733.920343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.929697] Call Trace: [ 733.932302] dump_stack+0x172/0x1f0 [ 733.935945] should_fail.cold+0xa/0x1b [ 733.939840] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.944951] ? mark_held_locks+0xb1/0x100 [ 733.949119] __should_failslab+0x121/0x190 [ 733.953365] should_failslab+0x9/0x14 [ 733.957171] kmem_cache_alloc+0x47/0x710 [ 733.961243] ? find_held_lock+0x35/0x130 [ 733.965325] ? vti6_tnl_lookup+0x287/0x1020 [ 733.969660] skb_ext_add+0xfa/0x640 [ 733.973298] ? check_preemption_disabled+0x48/0x290 [ 733.978343] secpath_set+0xc9/0x1c0 [ 733.981975] xfrm_input+0x37b/0x3070 [ 733.985696] ? find_held_lock+0x35/0x130 [ 733.989772] ? xfrm_input_get_afinfo+0x260/0x260 [ 733.994539] ? lock_downgrade+0x810/0x810 [ 733.998697] ? __lock_is_held+0xb6/0x140 [ 734.002768] xfrm6_rcv_tnl+0x175/0x1e0 [ 734.006666] xfrm6_rcv+0x18/0x20 [ 734.010046] xfrm6_esp_rcv+0xd8/0x230 [ 734.013861] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 734.018802] ? lock_acquire+0x16f/0x3f0 [ 734.022802] ? rcu_softirq_qs+0x10/0x20 [ 734.026878] ip6_input_finish+0x84/0x170 [ 734.030943] ip6_input+0xe4/0x3f0 [ 734.032864] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.034401] ? ip6_input_finish+0x170/0x170 [ 734.034432] ? ip6_protocol_deliver_rcu+0x16c0/0x16c0 [ 734.034450] ? ipv6_chk_mcast_addr+0x2f2/0x6f0 [ 734.034471] ip6_mc_input+0x4aa/0xf30 [ 734.034490] ? ip6_input+0x3f0/0x3f0 [ 734.034523] ip6_rcv_finish+0x1e7/0x320 [ 734.066309] ipv6_rcv+0x10e/0x420 [ 734.069776] ? ip6_rcv_core.isra.0+0x1c00/0x1c00 [ 734.074550] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 734.079753] ? ip6_rcv_core.isra.0+0x1c00/0x1c00 [ 734.084515] __netif_receive_skb_one_core+0x115/0x1a0 [ 734.089707] ? __netif_receive_skb_core+0x3010/0x3010 [ 734.094897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.100437] ? check_preemption_disabled+0x48/0x290 [ 734.105452] ? lock_acquire+0x16f/0x3f0 [ 734.109433] __netif_receive_skb+0x2c/0x1c0 [ 734.113753] netif_receive_skb_internal+0x117/0x660 [ 734.118791] ? dev_cpu_dead+0x920/0x920 [ 734.122788] ? eth_gro_receive+0x890/0x890 [ 734.127041] napi_gro_frags+0xade/0xd10 [ 734.131020] tun_get_user+0x2832/0x38d0 [ 734.135006] ? mark_held_locks+0x100/0x100 [ 734.139274] ? tun_build_skb.isra.0+0x1150/0x1150 [ 734.144132] ? tun_get+0x171/0x290 [ 734.147674] ? lock_downgrade+0x810/0x810 [ 734.151838] ? kasan_check_read+0x11/0x20 [ 734.156000] tun_chr_write_iter+0xbd/0x160 [ 734.160239] do_iter_readv_writev+0x5e0/0x8e0 [ 734.164743] ? vfs_dedupe_file_range+0x780/0x780 [ 734.169496] ? apparmor_file_permission+0x25/0x30 [ 734.174346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.179889] ? rw_verify_area+0x118/0x360 [ 734.184037] do_iter_write+0x184/0x610 [ 734.187935] ? dup_iter+0x260/0x260 [ 734.191566] vfs_writev+0x1b3/0x2f0 [ 734.195189] ? vfs_iter_write+0xb0/0xb0 [ 734.199161] ? kasan_check_read+0x11/0x20 [ 734.203303] ? iterate_fd+0x360/0x360 [ 734.207091] ? check_preemption_disabled+0x48/0x290 [ 734.212109] ? wait_for_completion+0x440/0x440 [ 734.216703] ? __fget_light+0x1a9/0x230 [ 734.220674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.226201] do_writev+0xf6/0x290 [ 734.229644] ? vfs_writev+0x2f0/0x2f0 [ 734.233448] ? do_syscall_64+0x26/0x610 [ 734.237434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.242792] ? do_syscall_64+0x26/0x610 [ 734.246769] __x64_sys_writev+0x75/0xb0 [ 734.250753] do_syscall_64+0x103/0x610 [ 734.254651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.259836] RIP: 0033:0x457cf1 [ 734.263014] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 734.281938] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 734.289669] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 734.296960] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 734.304212] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 734.311468] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 734.318725] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 [ 734.326094] kasan: CONFIG_KASAN_INLINE enabled [ 734.330926] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 734.338345] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 734.344594] CPU: 0 PID: 14750 Comm: syz-executor.0 Not tainted 5.0.0-rc5+ #69 [ 734.351876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.361243] RIP: 0010:xfrmi_rcv_cb+0x14c/0x970 [ 734.365821] Code: 7c f5 08 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 07 00 00 48 b8 00 00 00 00 00 fc ff df 4f 8b 6c f5 08 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 2a 07 00 00 49 8b 7d 00 49 8d b5 d0 00 00 00 e8 [ 734.384715] RSP: 0018:ffff888064227110 EFLAGS: 00010246 [ 734.390074] RAX: dffffc0000000000 RBX: ffff88808bddba40 RCX: ffffc90005deb000 [ 734.397420] RDX: 0000000000000000 RSI: ffffffff8602239a RDI: ffff888090f970c8 [ 734.404682] RBP: ffff888064227148 R08: ffff88808ed0e640 R09: ffffed1015d05bd0 [ 734.411946] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 00000000ffffffff [ 734.419197] R13: 0000000000000000 R14: ffffffffffffffff R15: 00000000ffffffff [ 734.426459] FS: 00007ff1bde6c700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 734.434674] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 734.440535] CR2: 0000000020200000 CR3: 0000000099529000 CR4: 00000000001406f0 [ 734.447788] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 734.455046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 734.462308] Call Trace: [ 734.464887] xfrm6_rcv_cb+0x118/0x290 [ 734.468687] xfrm_input+0x8f4/0x3070 [ 734.472396] ? find_held_lock+0x35/0x130 [ 734.476452] ? xfrm_input_get_afinfo+0x260/0x260 [ 734.481204] ? lock_downgrade+0x810/0x810 [ 734.485338] ? __lock_is_held+0xb6/0x140 [ 734.489385] xfrm6_rcv_tnl+0x175/0x1e0 [ 734.493275] xfrm6_rcv+0x18/0x20 [ 734.496630] xfrm6_esp_rcv+0xd8/0x230 [ 734.500414] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 734.505333] ? lock_acquire+0x16f/0x3f0 [ 734.509310] ? rcu_softirq_qs+0x10/0x20 [ 734.513291] ip6_input_finish+0x84/0x170 [ 734.517366] ip6_input+0xe4/0x3f0 [ 734.520825] ? ip6_input_finish+0x170/0x170 [ 734.525138] ? ip6_protocol_deliver_rcu+0x16c0/0x16c0 [ 734.530330] ? ipv6_chk_mcast_addr+0x2f2/0x6f0 [ 734.534897] ip6_mc_input+0x4aa/0xf30 [ 734.538694] ? ip6_input+0x3f0/0x3f0 [ 734.542409] ip6_rcv_finish+0x1e7/0x320 [ 734.546400] ipv6_rcv+0x10e/0x420 [ 734.549839] ? ip6_rcv_core.isra.0+0x1c00/0x1c00 [ 734.554596] ? ip6_rcv_finish_core.isra.0+0x590/0x590 [ 734.559777] ? ip6_rcv_core.isra.0+0x1c00/0x1c00 [ 734.564537] __netif_receive_skb_one_core+0x115/0x1a0 [ 734.569711] ? __netif_receive_skb_core+0x3010/0x3010 [ 734.574896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.580441] ? check_preemption_disabled+0x48/0x290 [ 734.585450] ? lock_acquire+0x16f/0x3f0 [ 734.589412] __netif_receive_skb+0x2c/0x1c0 [ 734.593729] netif_receive_skb_internal+0x117/0x660 [ 734.598742] ? dev_cpu_dead+0x920/0x920 [ 734.602704] ? eth_gro_receive+0x890/0x890 [ 734.606943] napi_gro_frags+0xade/0xd10 [ 734.610920] tun_get_user+0x2832/0x38d0 [ 734.614894] ? mark_held_locks+0x100/0x100 [ 734.619136] ? tun_build_skb.isra.0+0x1150/0x1150 [ 734.623973] ? tun_get+0x171/0x290 [ 734.627540] ? lock_downgrade+0x810/0x810 [ 734.631694] ? kasan_check_read+0x11/0x20 [ 734.635845] tun_chr_write_iter+0xbd/0x160 [ 734.640082] do_iter_readv_writev+0x5e0/0x8e0 [ 734.644575] ? vfs_dedupe_file_range+0x780/0x780 [ 734.649345] ? apparmor_file_permission+0x25/0x30 [ 734.654190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 734.659723] ? rw_verify_area+0x118/0x360 [ 734.663872] do_iter_write+0x184/0x610 [ 734.667760] ? dup_iter+0x260/0x260 [ 734.671390] vfs_writev+0x1b3/0x2f0 [ 734.675018] ? vfs_iter_write+0xb0/0xb0 [ 734.678991] ? kasan_check_read+0x11/0x20 [ 734.683145] ? iterate_fd+0x360/0x360 [ 734.686947] ? check_preemption_disabled+0x48/0x290 [ 734.691967] ? wait_for_completion+0x440/0x440 [ 734.696549] ? __fget_light+0x1a9/0x230 [ 734.700528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.706063] do_writev+0xf6/0x290 [ 734.709521] ? vfs_writev+0x2f0/0x2f0 [ 734.713344] ? do_syscall_64+0x26/0x610 [ 734.717313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.722671] ? do_syscall_64+0x26/0x610 [ 734.726645] __x64_sys_writev+0x75/0xb0 [ 734.730621] do_syscall_64+0x103/0x610 [ 734.734506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.739694] RIP: 0033:0x457cf1 [ 734.742882] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 734.761900] RSP: 002b:00007ff1bde6bba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 734.769608] RAX: ffffffffffffffda RBX: 0000000000211d49 RCX: 0000000000457cf1 [ 734.776870] RDX: 0000000000000001 RSI: 00007ff1bde6bbf0 RDI: 00000000000000f0 [ 734.784136] RBP: 0000000020000000 R08: 00000000000000f0 R09: 0000000000000000 [ 734.791398] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ff1bde6c6d4 [ 734.798662] R13: 00000000004c646c R14: 00000000004db860 R15: 0000000000000004 [ 734.805933] Modules linked in: [ 734.809240] ---[ end trace 488ee2f70350d834 ]--- [ 734.814066] RIP: 0010:xfrmi_rcv_cb+0x14c/0x970 [ 734.818696] Code: 7c f5 08 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 57 07 00 00 48 b8 00 00 00 00 00 fc ff df 4f 8b 6c f5 08 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 2a 07 00 00 49 8b 7d 00 49 8d b5 d0 00 00 00 e8 [ 734.837629] RSP: 0018:ffff888064227110 EFLAGS: 00010246 [ 734.842992] RAX: dffffc0000000000 RBX: ffff88808bddba40 RCX: ffffc90005deb000 [ 734.850298] RDX: 0000000000000000 RSI: ffffffff8602239a RDI: ffff888090f970c8 [ 734.857586] RBP: ffff888064227148 R08: ffff88808ed0e640 R09: ffffed1015d05bd0 [ 734.864888] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 00000000ffffffff [ 734.872165] R13: 0000000000000000 R14: ffffffffffffffff R15: 00000000ffffffff [ 734.879463] FS: 00007ff1bde6c700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 734.887712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 734.893589] CR2: 0000000020200000 CR3: 0000000099529000 CR4: 00000000001406f0 [ 734.900922] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 734.908227] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 734.915527] Kernel panic - not syncing: Fatal exception in interrupt [ 734.923134] Kernel Offset: disabled [ 734.926754] Rebooting in 86400 seconds..