vice bond0 [ 728.742753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 728.811903] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 728.818082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 728.826879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.039459] 8021q: adding VLAN 0 to HW filter on device team0 03:34:59 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:34:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x423d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f0000000240)) 03:34:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x3700}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:34:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4}, 'syz1\x00'}) 03:34:59 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:34:59 executing program 1: keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xeffdffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 729.662417] input: syz1 as /devices/virtual/input/input1434 [ 729.676808] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.683988] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.706359] input: syz1 as /devices/virtual/input/input1435 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 729.721056] device bridge0 left promiscuous mode 03:35:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x200000, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000140)=0x8001, &(0x7f0000000180)=0x2) 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7f00000000000000}, 'syz1\x00'}) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x3f000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 729.790641] XFS (loop0): Invalid superblock magic number [ 729.922213] input: syz1 as /devices/virtual/input/input1436 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x3f00}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) [ 729.975249] input: syz1 as /devices/virtual/input/input1437 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673fb", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:00 executing program 1: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r1, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r3 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) r4 = dup2(r1, r3) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000000100)={0x2, r2}) 03:35:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd44f}, 'syz1\x00'}) 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x1000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 730.457792] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.464330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.470904] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.477285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.483942] device bridge0 entered promiscuous mode [ 730.489563] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:00 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 730.549333] input: syz1 as /devices/virtual/input/input1438 [ 730.583152] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.590520] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xffffff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 730.615095] input: syz1 as /devices/virtual/input/input1439 [ 730.649464] device bridge0 left promiscuous mode 03:35:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) 03:35:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x39d40000}, 'syz1\x00'}) 03:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x8dffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:01 executing program 4: socketpair$inet6(0xa, 0x80000, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="af000000609a2853a63d928ed659cf3f785de4a5753e4833692f3ef28b893058cac4bc1a51a3543402e05f95fe1624500405a42f96139c4d6fe35444e80ec5f85d109f46576f11e9c94f38f5e5823b433a867651850c841abcd094da31183e0532c29456be4343c22f5a62cfd071f023e09b400222e8fe628a3ea9e54b168f6cefa04819e68f9b745678c8eca947247b2158253c46617a112b9a3ebc3ca6b49d569603093ee66b011a4e86a64f909d4be6ef18"], &(0x7f0000000300)=0xb7) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e21, 0x800, @loopback, 0x1ff}}, 0x3000000, 0x9e9, 0x4, 0x9, 0x4}, 0x98) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r4}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x105100, 0x0) [ 730.821976] input: syz1 as /devices/virtual/input/input1440 [ 730.869083] input: syz1 as /devices/virtual/input/input1441 [ 731.216510] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.223219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.229932] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.236330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.243045] device bridge0 entered promiscuous mode [ 731.250394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:01 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673fd", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xfffffdef}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x37d40000}, 'syz1\x00'}) 03:35:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xc, 0x100010, r1, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r2}) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) 03:35:01 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xc7edff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 731.332634] input: syz1 as /devices/virtual/input/input1442 [ 731.358632] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.366130] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.399526] input: syz1 as /devices/virtual/input/input1443 [ 731.413085] device bridge0 left promiscuous mode 03:35:01 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:01 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) 03:35:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x53d4}, 'syz1\x00'}) 03:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x3f00000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 731.582362] input: syz1 as /devices/virtual/input/input1444 03:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xffffff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 731.629650] input: syz1 as /devices/virtual/input/input1445 [ 731.657198] IPVS: ftp: loaded support on port[0] = 21 03:35:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0xf0ffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 732.008414] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.014849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.021512] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.027908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.036611] device bridge0 entered promiscuous mode [ 732.042364] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 732.049122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 732.062926] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.071028] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.344005] bridge0: port 2(bridge_slave_1) entered blocking state [ 732.350495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 732.357226] bridge0: port 1(bridge_slave_0) entered blocking state [ 732.363573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 732.370330] device bridge0 entered promiscuous mode 03:35:02 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x7fffeff0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd457}, 'syz1\x00'}) 03:35:02 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:02 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) 03:35:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x37}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 732.451408] input: syz1 as /devices/virtual/input/input1446 [ 732.458836] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.466266] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.489656] input: syz1 as /devices/virtual/input/input1447 [ 732.496383] device bridge0 left promiscuous mode [ 732.635537] XFS (loop0): Invalid superblock magic number [ 732.967499] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.974458] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.981260] device bridge0 left promiscuous mode [ 733.289863] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.296292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 733.302971] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.309369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 733.316827] device bridge0 entered promiscuous mode [ 733.322855] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.329248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 733.335906] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.342267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 733.349744] device bridge0 entered promiscuous mode [ 733.545212] device bridge_slave_1 left promiscuous mode [ 733.550750] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.604736] device bridge_slave_0 left promiscuous mode [ 733.610186] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.668497] team0 (unregistering): Port device team_slave_1 removed [ 733.677037] team0 (unregistering): Port device team_slave_0 removed [ 733.685937] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 733.746684] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 733.794453] bond0 (unregistering): Released all slaves [ 733.973492] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.980050] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.987233] device bridge_slave_0 entered promiscuous mode [ 734.013322] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.019811] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.027401] device bridge_slave_1 entered promiscuous mode [ 734.060269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 734.092796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 734.196300] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 734.233750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 734.397623] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 734.405452] team0: Port device team_slave_0 added [ 734.426857] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 734.433856] team0: Port device team_slave_1 added [ 734.456325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 734.463178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 734.471031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 734.501364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 734.508650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 734.519788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 734.542370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 734.550157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.558102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 734.590274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 734.597891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.605819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 734.803548] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.809955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.816593] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.822931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.830419] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 735.424522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 735.541447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 735.614641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 735.685365] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 735.691523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 735.698677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.768591] 8021q: adding VLAN 0 to HW filter on device team0 03:35:06 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x800000000000000}, 'syz1\x00'}) 03:35:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x7b002000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:06 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:06 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) 03:35:06 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x4000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 736.209038] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.216399] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.226354] input: syz1 as /devices/virtual/input/input1448 [ 736.237263] device bridge0 left promiscuous mode [ 736.247649] input: syz1 as /devices/virtual/input/input1449 03:35:06 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x300000000000000}, 'syz1\x00'}) 03:35:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7fffedc7}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7fffeff0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 736.420779] input: syz1 as /devices/virtual/input/input1450 [ 736.452520] input: syz1 as /devices/virtual/input/input1451 03:35:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x41d4000000000000}, 'syz1\x00'}) 03:35:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7ffff000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 736.625905] input: syz1 as /devices/virtual/input/input1452 [ 736.678356] input: syz1 as /devices/virtual/input/input1453 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0ffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 737.040630] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.047125] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.053849] device bridge0 left promiscuous mode [ 737.142644] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.149134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.155840] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.162196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.168924] device bridge0 entered promiscuous mode [ 737.175043] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.181444] bridge0: port 2(bridge_slave_1) entered forwarding state 03:35:07 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3ed4}, 'syz1\x00'}) 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x37}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:07 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) [ 737.188116] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.194523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.194717] device bridge0 entered promiscuous mode [ 737.242403] input: syz1 as /devices/virtual/input/input1454 [ 737.260832] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.268220] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:07 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:07 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 737.313549] device bridge0 left promiscuous mode [ 737.328767] input: syz1 as /devices/virtual/input/input1455 03:35:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4800000000000000}, 'syz1\x00'}) 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7ffffffff000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 737.479656] input: syz1 as /devices/virtual/input/input1456 [ 737.510030] input: syz1 as /devices/virtual/input/input1457 03:35:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xff03}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x57d4}, 'syz1\x00'}) [ 737.572325] XFS (loop0): Invalid superblock magic number [ 737.625976] IPVS: ftp: loaded support on port[0] = 21 03:35:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x3700000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 737.702520] input: syz1 as /devices/virtual/input/input1458 [ 737.741381] input: syz1 as /devices/virtual/input/input1459 [ 738.070087] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.076526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.083133] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.089554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.096232] device bridge0 entered promiscuous mode [ 738.102376] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.109637] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.116815] device bridge0 left promiscuous mode 03:35:08 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x37000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd430}, 'syz1\x00'}) 03:35:08 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) [ 738.213877] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.220333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.227049] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.233417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.240203] device bridge0 entered promiscuous mode [ 738.307087] input: syz1 as /devices/virtual/input/input1460 [ 738.315527] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.322776] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.339095] input: syz1 as /devices/virtual/input/input1461 [ 738.355401] device bridge0 left promiscuous mode [ 738.706858] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.713350] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.719845] device bridge0 left promiscuous mode [ 738.800221] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.806684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.813346] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.819743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.826859] device bridge0 entered promiscuous mode [ 738.833605] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.840042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.846723] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.853095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.860121] device bridge0 entered promiscuous mode [ 739.125847] device bridge_slave_1 left promiscuous mode [ 739.131367] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.194806] device bridge_slave_0 left promiscuous mode [ 739.200263] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.267459] team0 (unregistering): Port device team_slave_1 removed [ 739.276079] team0 (unregistering): Port device team_slave_0 removed [ 739.286508] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 739.316617] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 739.374717] bond0 (unregistering): Released all slaves [ 739.478755] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.485235] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.492101] device bridge_slave_0 entered promiscuous mode [ 739.515481] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.521881] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.529074] device bridge_slave_1 entered promiscuous mode [ 739.551364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 739.575112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 739.679921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 739.718487] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 739.886766] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 739.894054] team0: Port device team_slave_0 added [ 739.929342] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 739.936660] team0: Port device team_slave_1 added [ 739.972467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 739.997807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 740.020939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 740.028109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 740.037209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 740.067860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 740.289977] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.296380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 740.302939] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.309317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 741.018484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 741.088644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 741.158350] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 741.164668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 741.171613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 741.241074] 8021q: adding VLAN 0 to HW filter on device team0 03:35:11 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x210100, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x80, 0x5, 0x3, 0x400, 0x3, 0x5, 0xffffffffffffff7f, 0x9, 0x2, 0x4, 0x4, 0x81}) r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1, 0x2000) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000380)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) listen(r1, 0x7ff) listen(r1, 0x8) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x26a700000, 0x100) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:35:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x3f000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:11 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd433}, 'syz1\x00'}) 03:35:11 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:11 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r2, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) getpeername(r1, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000480)) r4 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r5 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(r1, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000240)) 03:35:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000000)={@local}, 0x20) r2 = msgget$private(0x0, 0x4) userfaultfd(0x80800) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x6) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000200)=""/250) r3 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000880)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000840)={&(0x7f0000000340)=ANY=[@ANYBLOB="9ba9243ba6ccbd18fc4dfe22acfc8fa58157955e6c05d3466b6dabb2818ecdbedc9feafa"], 0x1}, 0x1, 0x0, 0x0, 0x20000040}, 0x40040) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)) rt_sigprocmask(0x0, &(0x7f00000001c0), &(0x7f0000000140), 0xfffffffffffffd88) [ 741.678377] input: syz1 as /devices/virtual/input/input1462 [ 741.686620] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.693086] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.701949] input: syz1 as /devices/virtual/input/input1463 [ 741.714928] device bridge0 left promiscuous mode 03:35:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0ffffff7f0000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x54d40000}, 'syz1\x00'}) [ 741.788675] XFS (loop0): Invalid superblock magic number 03:35:12 executing program 5: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000180)={0xffffffffffffffff}) listen(r0, 0x1ff) r1 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x10031, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000000)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000cc000000000000000000000d8fa0a8a98627bd82b75d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cc13ce3af79300000000000000000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x78) 03:35:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x2}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 741.918213] input: syz1 as /devices/virtual/input/input1464 03:35:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0/file0\x00', 0x4) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240)=""/95, 0x5f) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, &(0x7f0000000300)=ANY=[]) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 741.966652] input: syz1 as /devices/virtual/input/input1465 [ 741.969811] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.980140] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xff03000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.018566] device bridge0 left promiscuous mode 03:35:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x97ffffff00000000}, 'syz1\x00'}) [ 742.100000] input: syz1 as /devices/virtual/input/input1466 [ 742.135360] input: syz1 as /devices/virtual/input/input1467 [ 742.453210] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.459698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.466400] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.472763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 742.479715] device bridge0 entered promiscuous mode [ 742.485372] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 742.492347] bridge0: port 2(bridge_slave_1) entered blocking state 03:35:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x8000000}, 'syz1\x00'}) 03:35:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x200000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000)={0x77359400}, 0x10) listen(r0, 0xfffefffffffffe04) r1 = accept4(r0, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_newaddr={0x20, 0x14, 0x2, 0x70bd2b, 0x25dfdbfe, {0xa, 0x0, 0x28, 0xff, r3}, [@IFA_FLAGS={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x200480c0) socket$inet6(0xa, 0x3, 0x39dc7b36) shutdown(r0, 0x0) sendto$inet6(r2, &(0x7f0000000080)='5', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0xb) 03:35:12 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:12 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 742.498749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.505421] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.511784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 742.518964] device bridge0 entered promiscuous mode [ 742.525203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7b0020}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.591965] input: syz1 as /devices/virtual/input/input1468 [ 742.620390] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.626894] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.637587] input: syz1 as /devices/virtual/input/input1469 03:35:13 executing program 5: r0 = getpid() sched_getaffinity(r0, 0x8, &(0x7f0000000180)) r1 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) socket$rds(0x15, 0x5, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000300)={0x4, 0x4, 0x8000}, 0x4) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x7fffffff, 0x581002) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000480)=0x3, 0x4) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009d43500000000000040000000"], 0x10}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000680)={&(0x7f0000000500), 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x8c, r4, 0x902, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x196}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000140)=ANY=[]) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f00000001c0)) r8 = getegid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000003c0)={0x90, 0x0, 0x0, {0x5, 0x0, 0x80000000, 0x599c652a, 0x1, 0x4, {0x1, 0x1f, 0x10001, 0x6, 0x7fffffff, 0x4, 0x800, 0x9, 0x11, 0xc00000, 0x2, r6, r8, 0x0, 0x2}}}, 0x90) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f00000004c0)=0x9) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000006c0)=r5) getgroups(0x8, &(0x7f0000000340)=[r8, r7, r8, r8, r8, r8, r8, r7]) [ 742.684887] device bridge0 left promiscuous mode 03:35:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x49d4}, 'syz1\x00'}) 03:35:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xc7edff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0ff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.801804] input: syz1 as /devices/virtual/input/input1470 [ 742.841429] input: syz1 as /devices/virtual/input/input1471 03:35:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x1000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.908813] IPVS: ftp: loaded support on port[0] = 21 03:35:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd454}, 'syz1\x00'}) 03:35:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x20007b00}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 742.967420] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.973875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.980538] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.986928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.003073] input: syz1 as /devices/virtual/input/input1472 03:35:13 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 743.022708] device bridge0 entered promiscuous mode [ 743.032576] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 743.041826] input: syz1 as /devices/virtual/input/input1473 [ 743.124096] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.132667] bridge0: port 1(bridge_slave_0) entered disabled state [ 743.142839] device bridge0 left promiscuous mode 03:35:13 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000100)={&(0x7f0000ff7000/0x7000)=nil, 0x10001, 0x0, 0x8, &(0x7f0000ffb000/0x2000)=nil}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000180), 0x4924924924925a6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(r2, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 03:35:13 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4bd4000000000000}, 'syz1\x00'}) 03:35:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0ffffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 743.457309] input: syz1 as /devices/virtual/input/input1474 [ 743.514955] input: syz1 as /devices/virtual/input/input1475 [ 743.552191] XFS (loop0): Invalid superblock magic number [ 743.801906] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.808394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.815083] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.821459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.828546] device bridge0 entered promiscuous mode [ 743.834077] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 743.841090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 743.853299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 744.105540] device bridge_slave_1 left promiscuous mode [ 744.111071] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.154826] device bridge_slave_0 left promiscuous mode [ 744.160295] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.218066] team0 (unregistering): Port device team_slave_1 removed [ 744.226596] team0 (unregistering): Port device team_slave_0 removed [ 744.235541] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 744.286840] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 744.334641] bond0 (unregistering): Released all slaves [ 744.479798] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.486293] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.493178] device bridge_slave_0 entered promiscuous mode [ 744.529922] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.537018] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.544937] device bridge_slave_1 entered promiscuous mode [ 744.581336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 744.617380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 744.723348] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 744.761947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 744.909175] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 744.916638] team0: Port device team_slave_0 added [ 744.950285] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 744.957608] team0: Port device team_slave_1 added [ 744.980524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 745.003661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 745.027755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 745.034815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 745.042624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 745.084832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 745.091872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 745.100342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 745.296756] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.303118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.309757] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.316135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 745.323237] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 745.894286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 746.047835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 746.119898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 746.188993] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 746.195646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 746.202583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 746.276963] 8021q: adding VLAN 0 to HW filter on device team0 03:35:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6367726f75702e636f6574726f6f9316697300b5c3463474336043ea4cf3e3e2e9c7a7479af6ba61d1d346a5ee0c3b5503da893b9746d9ad6149fc04f9ef382806802cb3e6ea1ed4125cf3f23d3d158f925e90b04f7ffed6b98db6442747a3ae215aa7697b9aebe9df0b2b0e1d1d2bd2de71e3297ee5a2f8522bb5d92d3a25492849a9736ad8fe18800a5e244c69c2abbcc3aa475372223bc03b79d929eb42920b736e363e8451dec44461d03a8ecbd43e1bc899a7fb74b92765930bfe", 0x275a, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x80000001) tee(r0, r0, 0xfffffffffffffffe, 0x2) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000001c0)=""/4096) fallocate(r0, 0x51, 0x0, 0x5ee1f327) 03:35:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x8dffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xffff1f00}, 'syz1\x00'}) 03:35:17 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:17 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673eb", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:17 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xfffffe97) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) clone(0x200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000000), 0x0) [ 746.712965] input: syz1 as /devices/virtual/input/input1476 [ 746.747175] input: syz1 as /devices/virtual/input/input1477 [ 746.747997] bridge0: port 2(bridge_slave_1) entered disabled state 03:35:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0efff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 746.761126] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:17 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = getpid() sched_setaffinity(r3, 0x8, &(0x7f00000000c0)=0x75f9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) dup2(r1, r0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) 03:35:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0xcba782fd54400dce, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000400)={0x1, 0x23b0, 0x9, 0x6, 0x2, 0x4, 0x1c, 0x7, 0x1, 0x0, 0x2}, 0xb) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) bind$bt_hci(r1, &(0x7f0000000040), 0x58) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8001, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000100)) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x4) [ 746.817215] device bridge0 left promiscuous mode 03:35:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xfdffffff}, 'syz1\x00'}) 03:35:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) r1 = socket$inet(0x2, 0xf, 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000004c0)={0x0, 0x0, 0x1, [0x0]}, &(0x7f0000000600)=0xa) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x40, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000a80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b00)}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/80, 0x50}, {&(0x7f0000000bc0)=""/95, 0x5f}, {&(0x7f0000000c40)=""/166, 0xa6}, {&(0x7f0000000d00)=""/7, 0x7}], 0x6, &(0x7f0000000dc0)=""/34, 0x22, 0x7}, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000f00)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000016c0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000017c0)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0}, &(0x7f0000001940)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001980)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003b00)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003c00)=0xe8) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000004000)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f0000003fc0)={&(0x7f0000003c40)={0x348, r4, 0x2, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x228, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xba7}}}]}}, {{0x8, 0x1, r10}, {0xfc, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8, 0x3, 0x800}, {0xffff, 0x1ff, 0x4, 0x7fff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r12}}}]}}]}, 0x348}, 0x1, 0x0, 0x0, 0xc0}, 0x10) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000400)={r2, 0x3, 0x7, 0xfffff7ffffffffff}, &(0x7f0000000440)=0xfffffffffffffe4a) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xff030000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 746.932773] input: syz1 as /devices/virtual/input/input1478 03:35:17 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r3) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r4 = syz_open_procfs(0x0, &(0x7f00000015c0)='net/fib_triestat\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r4, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, &(0x7f0000000280)={0xa, 0x0, 0x3, @local}, 0x1c) getrandom(&(0x7f0000000400)=""/184, 0xfffffffffffffcaa, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x404000, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000040)=@generic={0x3}) r7 = socket$inet(0x2, 0x2, 0x0) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x0, 0x8}) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r9, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e7ff11000000f3ffffffffff04000a00"], 0x1}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x5) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, &(0x7f00000008c0)=ANY=[@ANYBLOB="18"]) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r10, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) [ 747.008301] input: syz1 as /devices/virtual/input/input1479 03:35:17 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x2b8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 03:35:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:17 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:17 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x35d40000}, 'syz1\x00'}) 03:35:17 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x40201f) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x8, 0x101000) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000040)="000000800000800000") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000000)="f8"}, 0x20) listen(r0, 0xfffffffffffffc00) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) quotactl(0x408, &(0x7f0000000100)='./file0\x00', r4, &(0x7f0000000200)="7792f979cbcd620859d7d0c167f2b9ab5a3271eb88d628c179589e81aca4965aa1dd98bd972fc1a4797c5ba821eb07dbb532c72a5083d06f296f969ae52d3766f736c53710ea884c152ce3e5927399832b7176d89b2643fb5138a6a517a506bd41ffa069e1dd674bb01b0f788e3cd42b94") sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x70}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) 03:35:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x4, 0x100000}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00') fchdir(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702f00797a3000bbd3c2830f2a102ed2060bdc00ca0afc0a0ab40400005d8ea974c281f5f1a6d118bc38d1a31d6c7a9ac86f072682cf09de0cb8bef55a1a530a3d2cee9ed82516a500ca71b2d0426b9ecd1e2567f55fc232021cccb1dc618056acf431027a552b2b37cf5317c9194789fbfbfec9159de60772992222334c67e84ec1", 0x1ff) epoll_wait(r0, &(0x7f0000000000)=[{}, {}], 0x2, 0x1f) 03:35:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xffffff8d}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 747.542278] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.548710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.555394] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.561737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.568526] device bridge0 entered promiscuous mode [ 747.625067] input: syz1 as /devices/virtual/input/input1480 03:35:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x141100, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000040)=0x6) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x11, &(0x7f0000000100)={0x4}, 0x88) 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0ff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:18 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40bc5311, &(0x7f00000001c0)={{0x80}}) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x0) [ 747.670952] input: syz1 as /devices/virtual/input/input1481 [ 747.704198] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.710683] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4dd40000}, 'syz1\x00'}) 03:35:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f00000001c0)={0x0, 0x0}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xc7edff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 747.759151] XFS (loop0): Invalid superblock magic number [ 747.775360] device bridge0 left promiscuous mode [ 747.832255] input: syz1 as /devices/virtual/input/input1482 [ 747.904073] input: syz1 as /devices/virtual/input/input1483 03:35:18 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:18 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x100000004e23, @multicast1}, 0x102) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000001700)="8a", 0x1, 0x8000, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040)=0x2000, 0x224) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd\x00') ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f00000000c0)={0x9, 0x500, 0xd1}) 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x68000000}, 'syz1\x00'}) 03:35:18 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 748.090437] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.096851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 748.103416] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.109794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.116446] device bridge0 entered promiscuous mode 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x8dffffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 748.183851] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.191171] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.214806] input: syz1 as /devices/virtual/input/input1484 [ 748.217215] device bridge0 left promiscuous mode 03:35:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r0, 0x29, 0x37, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x241, 0x0) ioctl$TIOCEXCL(r1, 0x540c) [ 748.246032] input: syz1 as /devices/virtual/input/input1485 03:35:18 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sctp\x00') write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x7}, 0xb) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xe) sendmsg$nl_generic(r0, &(0x7f00000009c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000001640)=ANY=[]}}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x8000a0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x18}, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000800)={0x17, 0x0, 0x7f}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000680)) syz_genetlink_get_family_id$fou(&(0x7f0000000880)='fou\x00') accept4$inet(r0, 0x0, &(0x7f0000000140), 0x80800) getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r1, 0xa, 0x2}, 0x10) 03:35:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x33d4}, 'syz1\x00'}) 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x7b002000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:18 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@deltaction={0x18, 0x31, 0x803, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r1, 0x50, 0x10, 0x401, 0x100}, &(0x7f00000001c0)=0x18) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924924f0, 0x0) [ 748.388904] XFS (loop0): Invalid superblock magic number [ 748.421478] input: syz1 as /devices/virtual/input/input1486 03:35:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x3700}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 748.485505] input: syz1 as /devices/virtual/input/input1487 [ 748.558454] IPVS: ftp: loaded support on port[0] = 21 03:35:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) 03:35:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd439}, 'syz1\x00'}) 03:35:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xfffffff0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:19 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@deltaction={0x18, 0x31, 0x803, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r1, 0x50, 0x10, 0x401, 0x100}, &(0x7f00000001c0)=0x18) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924924f0, 0x0) [ 748.715740] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.722196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 748.728885] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.735288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.741959] device bridge0 entered promiscuous mode 03:35:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="7866730f", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 748.810747] input: syz1 as /devices/virtual/input/input1488 03:35:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) close(r0) fsync(r1) [ 748.879731] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.886233] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.922099] input: syz1 as /devices/virtual/input/input1489 [ 748.961327] device bridge0 left promiscuous mode [ 749.191085] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.197540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.204240] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.210624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.210819] device bridge0 entered promiscuous mode [ 749.445244] device bridge_slave_1 left promiscuous mode [ 749.450719] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.504811] device bridge_slave_0 left promiscuous mode [ 749.510267] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.577597] team0 (unregistering): Port device team_slave_1 removed [ 749.586882] team0 (unregistering): Port device team_slave_0 removed [ 749.596431] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 749.616675] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 749.664263] bond0 (unregistering): Released all slaves [ 749.802880] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.809417] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.816481] device bridge_slave_0 entered promiscuous mode [ 749.838286] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.844858] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.851702] device bridge_slave_1 entered promiscuous mode [ 749.894547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 749.928839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 750.032264] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 750.069795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 750.230098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 750.237554] team0: Port device team_slave_0 added [ 750.259517] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 750.266878] team0: Port device team_slave_1 added [ 750.289529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 750.319887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 750.353118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 750.378272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 750.589856] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.596255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.602812] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.609192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.305726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 751.373975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 751.441769] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 751.448189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 751.455578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.520627] 8021q: adding VLAN 0 to HW filter on device team0 03:35:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x109000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'bcsh0\x00', @random="a563c646ef9b"}) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 03:35:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xc000002000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x97ffffff}, 'syz1\x00'}) 03:35:22 executing program 4: symlink(&(0x7f0000000480)='./file1\x00', &(0x7f0000000440)='./file0\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', &(0x7f0000000280)=""/178, 0xb2) 03:35:22 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) 03:35:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfsP', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xf0efff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) [ 751.956275] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.962796] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.971599] input: syz1 as /devices/virtual/input/input1490 [ 751.994618] device bridge0 left promiscuous mode 03:35:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x4}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 752.066285] input: syz1 as /devices/virtual/input/input1491 03:35:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4cd40000}, 'syz1\x00'}) 03:35:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x200000c0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 752.197496] input: syz1 as /devices/virtual/input/input1492 [ 752.213868] input: syz1 as /devices/virtual/input/input1493 03:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) [ 752.460242] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.466697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.473350] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.479749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.498701] device bridge0 entered promiscuous mode [ 752.509140] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x43d4}, 'syz1\x00'}) 03:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) 03:35:22 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0xc, 0xfffffffffffff7e6, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) 03:35:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs9', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) [ 752.631344] input: syz1 as /devices/virtual/input/input1494 [ 752.653072] input: syz1 as /devices/virtual/input/input1495 [ 752.659889] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.666390] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 752.709381] device bridge0 left promiscuous mode 03:35:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3bd40000}, 'syz1\x00'}) 03:35:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xc0000020}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) [ 752.801096] input: syz1 as /devices/virtual/input/input1496 [ 752.850056] IPVS: ftp: loaded support on port[0] = 21 [ 752.863856] input: syz1 as /devices/virtual/input/input1497 03:35:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3f00}, 'syz1\x00'}) 03:35:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x3f00}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 752.965817] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.972267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.979042] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.985442] bridge0: port 1(bridge_slave_0) entered forwarding state 03:35:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 753.015523] input: syz1 as /devices/virtual/input/input1498 03:35:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x40000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 753.047716] device bridge0 entered promiscuous mode [ 753.052789] input: syz1 as /devices/virtual/input/input1499 [ 753.055688] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 753.218992] XFS (loop0): Invalid superblock magic number [ 753.384878] device bridge_slave_1 left promiscuous mode [ 753.390414] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.445090] device bridge_slave_0 left promiscuous mode [ 753.450540] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.507217] team0 (unregistering): Port device team_slave_1 removed [ 753.516377] team0 (unregistering): Port device team_slave_0 removed [ 753.524977] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 753.566511] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 753.635786] bond0 (unregistering): Released all slaves [ 753.686418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 753.923734] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.930460] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.937945] device bridge_slave_0 entered promiscuous mode [ 753.972878] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.979402] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.986729] device bridge_slave_1 entered promiscuous mode [ 754.023043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 754.058878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 754.162181] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 754.199099] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 754.296365] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 754.303463] team0: Port device team_slave_0 added [ 754.343098] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 754.350330] team0: Port device team_slave_1 added [ 754.372511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 754.405788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 754.432719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 754.456708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 754.654770] bridge0: port 2(bridge_slave_1) entered blocking state [ 754.661136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 754.667802] bridge0: port 1(bridge_slave_0) entered blocking state [ 754.674191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.389207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.461528] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 755.533669] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 755.539877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 755.547849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 755.614028] 8021q: adding VLAN 0 to HW filter on device team0 03:35:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) 03:35:26 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)="c8", 0x1}], 0x1, 0x35) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) 03:35:26 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd455}, 'syz1\x00'}) 03:35:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) write$UHID_INPUT(r3, &(0x7f00000006c0)={0x8, "8a86178fa586f8d7213aa6f466b75fbd67c374b74de1e88fe8c72c7fba4798e26decc37ff822c391800352d9d7d7158d1b50980d28c7851cebb41adce735a45ffa614ff0399040d8132bf9d8f365b410d43b39d9afe87b7788320844586cf499cbfda2bc1f20243743a806e0ab4eb95aecf9eda5e4cc0862f25347e5393259c2349be172c9887a852a836de14d083cfbe9e1f18b2f85f317bfd0a5f09118a76b138f87334ed4cf8a6ab01aa191e987be4326b30b7705e16f2301f8351f2eac77eb423a640333b176ea1f57829b092d3e4a6db85313996ceab8323a5689345569cc675a4242395f0892b84deb3f4343d6ac0d86892a0805b28620f8fcc0a136a21cf0a97a74496eb7de14302566ae981d29152abb0a4a12b14d4ae46aa877c26c4391e9098c3ce73092730a11721cee318deec061a94603b04511eb85b5a67c4a49a38fc09d0955e760c6708f8e30967a6729c1b72f2cce270cf4c466e9d688e11e411f2405e036fb9b4e8c8c7b8c83dec3f60f7392715300a57287d59c0f0833a6fc56eb92282b10c9e206b4b0f981bc47a54877c8b16883b50c0662a599806d8ad4cde76d2b44e2050b6d0d96824b7f2359aa054e437b16e6120d62581ca77504474bb7168b1e801e163cb4b3b549496a5c2c4d47ee7ff461078d556deaf8c5b57c43607198d873d8af529642fc92432da63e22556276b880e72a3a5ee5325bdba25b1c59b7a8cf90565eadca736853c7b2ceb789517a119e0be9a6d199e7a56613d51df6642e3a4bfc49a99fe81b36442bea81da216a8f51086cf4dffb87ab33084b8da84eccc6950ea733358ac25c3456a19be352de31b4ed4776897a8321007fb9663e2804f061b3e82b1e4893efa492f96d05ee6f1ec2c8ce46d4146ff0ca867607965502d404f84b5eadb19c23843e0a7fb2184416c4e3bfeeea54597b1e96968108088a7caeaee4fac75aa955a9c4ae7cd0e9a3cc140d50c57a8a1c167dc516c926737abebeedf2b8b11177936ff1ed2f831eee10d465fb75e70d787de54ccff6d6c273aa77cee9da5daae5e1a6a70872e564b097447e9fe4aeea67a5d2b5d98cf725ece1699b88bc24e6a376818faed2213a26ccd1888c7edb77eb54960217d2ea3bc76430f58d85affed832131e67e9b7624ee76d8553d3def452e89d9f6d2cba3a2afc489ef3ac3823d133b9ba917696ae0053e68d0a68d56b2ddf4dddd016e5510abc46e413ae242198ac362b3ac4b151d9513b461d91a2e1b4d6818e9b85a9ed1f0292ccd94063c246fcde8be7204d990648e5ef7d010429fbe6c613ffa7880700a5dc35724e1e80cfc1a5df4ec6aed73096707215cdd04f3bc797c9e8b45d06e43e1ba19acb52fd69df0d8c39a83a7973203146c28fc8b9451d90c6dd7f57af2eb7f3db1aac6f68c9bf232dc497a83e4529b67e308f73de176fb6738e769d2946b5a3b18b3566f9698bff7cba27d0723bd3f376fee0d8cb5ca8bdcc46c45e40bb44e20d3d403324c056b1c24f5fc16a2f286cbe4afa6fa8c38eae567ed8828fd62796c01c95cf7038808edcc1c38f31f2aae372d951916b7eadd615d6ea2d3e7d90aa453bd5db3ebff5911b945a676063a9c8308be4470cc7fec00c493128e08c254e85f0bc7abe17f9016b0f75a7137c700afec1b93bea6d79042a19906e1a609c568d23b38bc785303c68afe2fa6739b49224abfcc8a1a1d0405f468deeb3c79249599d3416633fe05a9136eea2cd25a707e9e76edfc1ee34668493cffe3c4d78197ca4704065ddc95c9b458f989cc5f39ab3c90500c9e4e756baafcca032bbf3d79b78f7ea1c33c13465f05f5f41f65bc3f37705c08210e6501646e09a4a31fac0e62faff24f5fcb9aaafccae34c5090aade82244daca2a5a280b926213414a7f65698a8a4558a6a35b6c9643c32271ba535a4cb7f37160a356769b9e87c125c466b2efe3735e2ff3c85e8f725540a4e1937c3164dc69256f7a9ee7e952ec5939f55b63be3203eda1d27f6009477c7f9aba258ceb1cca6b5986f98cab0d110c40ffeabfadc0d1e273395a1af3f6f6d472961f5f81fb9a6d20d0d7e953405248099a6d2d01d604ed8fc7b23f7dfc80403d866ea4015cb3ac06ff516e0dcc1cfb873e02a4a3025bdcdc04ea4e06905843267967ea9993c4ba4dd5b43ce979841a2280d01e885cf8a8ac7a5805da4d0c82c66ed69494725e4cb8a1c194d65437f11fc5dbfc90329621e7289bf805a0e6b63408375f769386cf091772a54791204446bc58af28d176cc6d366186164665dcb2627e50b86bcc540ddc32c678d83e7cacc306b0ac5e9c21687f08f392c244f05d3444c06c993dda0cc83494637e099ec5b5677f73b0d1c43194708afe8c5573152ea5025e3a7aeec319cff78906a9e5dbac737283fe94c34915a3327fba27cf337e8503c665abaf53c0a7fcfedbc00188c6537d136deae38eea167e5f598aeedb0258b1adce55f0ee545ac4cd86bed5388c92364fe2dc43c2c7f6bbef35832dab7359a66359e9fc2f8d9de13fac9a1dbbf8a4a09711f6c880c8d3e3e36d14dd4c7d309c98a27a0cbea0e336f106c63128504227fad86063e5cc10bbb1a8bea86fbe4cc9e8bf15ec8a30559bdbda78684e0e5f3b65d4601c98cd706c3f13f059ff735ca8abb72ffc3808233b993205a35669f1fcf28ba7df9a5cd228ca883deaabd43362b8dd5cf122ccdd12a845e1f0feb03f43f55295f774bc94d2d93887044cbde7bc5a4deb3bfc4d26d29e4fd6d4e88ea92f47b6d11e3a3fa003baab78544935e92b76055f4829cfa131ca30dffc25f65e68872485af67a2401a423f80b1950507c8498c835a5e1dd1ffd14ba2b4d4266606f3a1abf7c35db4640c39f6598f5e197d531a5e25dacc4491b8f041d41d86230767354c6d35899881d826810cb3cb58269c318f279958a2273435a51e77b99a4272ad9009c460d061237156f3b797044374ae847753473a1e77dea435e67262ffdc449be1e1647e6c2c242daee1b5e8f8df2a8ebdf24cfa59e5c32e22dadf91e505a46fcc76801dfd78a5b4cc023cfe866f50d850716be1b88cf2795db087c0d3a55eff4429ceb4e2b39efc15f9360fa5e77c21af1ef751dc73f97cddc0955d008dd10a58626dc33d29042c893756ef618b140aeefa7d0618ebf92815275fe6957a0226c7c732c343f40f213d307ab6bb01c50e82779c46b3985bce56770c747b791b40c4eede98d08c36cec7e37938c4316e907f0193553d6ab62fc1f602d0ad6bf7eda74b7e0eb45be0bf75529299f96d12d4902ddd76876da82819c307386b8487150e11bfd70170bf247010c06b4800d8ae8e5e1f35ade7e2569f8059cd443650f2474f4a0319540afc4fa94018c659b640bb7f7f55ae18b641d9a79656701ac5f31f76c630ddb6faa07a901b7c2a878fa11e6d59c71f043ed6ed1c5454f96edfc4be2c8227a3514baae90c0d41b982cb3b79748f5a90cd3c074a145861658a5798ba6c9f5390e074437c411d4e08c7addd326085996c6f2ea772f33943d1ed32e3a54bcca5c09119d3c3f96ab2af62d7035984a4457b99d5f02ffd6fbebc1da7cc733f0c7f1fec2f601b046eb8dec964474d0205a13710630ba7468ca8807b028cdaaeb1970fd8d31a68f7ef3e56a2cb300766fcbfc8f53bece56ba10b211df2c24c427df7c8b6ee69cd1edacf71e817d1732be3bfb85d1373f8a686c76ef9bcc071ec028341e7de4be5fd99c7206e9476cd1383ebbc1995ef09d5cc478ffb9623763507f12dd4a9b2f5a4ffbcf2a199fd9c7828ed65136c0918343a5dfed82789658f4dcaea806b229e7420a7d9a7e357280556a09f720571916b7efd1e0e2ebd1cedf2fb86c4eadae8fffd51309009058b0756e939541e972e4be30253bd277a43c27e83020223eab9bff1cfb332c59365113d8532c31a77945bba3e680e522b2d284997090a95ebf955fd05a6284f46db6a90d8f30968fd30a0517f46bfc3bcb9aad542da3b3cec430e25ee339485f17747b4ca72f900f831b8de74a858c982f73a3a30b3d816691d50226c1ce61c7549e8892180248544d0d99346489d38dcb041c4c43bef1beb5771df4af8cd8a3bd205314ffe08079041e8ce4733184c3bc24b124837acd90b31ac6fc5a4a2d0364143bb8f6ed60cb3860cdd5b4179c6a80f4c5f3a6e1437ec29d89f726ec776a5e784c4eba2dce6fab2e83174ee2a9a2a9672087ff4aa7e452ad1843546d44eda2c8c33a1043d06b4727f567d6c0693287c514834a033f4893739b80d99d35e45e7ad899d8740d901071e04eb2e930783bfe738d0e67e6df383919d73c12339dbafbc72da544511d00051c7629ffdc109b37ace21c9675cd54e5dfe6a36e48cf62d3f3431a1f8e2bfdf8c4207db66783b3d33fd755b9cdcc4e19c7b8dd78f6c2317ab8fa5da99c846567d1eee89b4a29fb44667991daf9490494f82721fbce475dec5f2fbd4aefac331d41a6fc60b4a54ea939c4128c1127098211714ea0e4843a2befadb4d6389be76e2a790d397752c78bf3b84465d3fc9c250cc5f43695b49c3f2fc078781983092b0a00e6c2b87e881fa1806c38118cce85cbf61d372a1574e2a5dc4898a99781ae7191430ecf7b51f248d5175adf00c69723c592ef6042f90954ead480c4d1cbd6197a6e5b16cc3c52578642df273677527b5ee8301ea2f891687d852ebefff6ef29eab71efd056b992a809af4f100adffda3080298f35c010a540785d80e7b21215052175e6ed0c8abb24633d5e39c7fd14c054a90f9ed4c6ac9203866047110abdad38c39ba994b613298b06085c1ac5382b506c90b8e0a452f5aa2769cc540aabed921d3699e10b408cd37118b3dc157c24df45c0cb1ac9f5e1f4a29c9542976a5cf7db3914f8ddcffbea353dca70ea94ec476f01cbf04f1d0cbb8db92109355a714ec7c361b9b88b737f6a36cefa2620b98cbe65769fdc33a061edb215ab5b693f27a1fae63a2507295615295cb148abccdb711133908dab3ec377251760936cd8dc2e59e037befcfacc17ff876e55cd3f66e6c6744589a112b3104ed265fb6ac94092d3c709181868c82c1211ad0e327e57fb0c9fce2ed43ac36a603928a366b0f1e95b16fad594ef43b8a6135b4e93eea2565a4468e423949871cd6faaa74bc6a984214b9c4854bafaea6698802be1fac06c6055a45ce4b86ddc230862363c612a2c7c2bf08c876f8c20f5beb134f04e5cdbed996dd54e5bac619d16aba136f9db47c8739f5aa04b9bc16feaaf0a4f47d5ee9e6a8eb1d72ca487baa33141d87d879298fc1057c9aee7b4d6beb5025c7b6c1d0e214d18e749bd6e1669ec3ccc1c1a4164b31fd9a0452d7214bb97bccdb8df0b2634122ad3bb008fb011cbdcc1b80653c3d8bf8346efa39674c23d6d59610e72e2f520667e7572e59a08b27855b4011f644f94e70a0e4ac59d1d5730f187016aa847aaaff4610071c494c01f9f768c27765e911704eb95a26b26d04b68f8a0512c55204ebf6870088972ea74c9014ab9239696bf6b6573c0a845c2260634f7c8261adc05c5d9e8b9ea5c87a9169919bd72cceecedc7eac5fdcd0073c67bd8bb9613d3c95cd00cc0d07a8d0c73911c442c8f92329f9b2980a9b6413c0618aa3ebe59d3a4beca3d2fb0881f56db7880b70973220a1da6232ace4d468696c29e9184b79a1634d74d651812bc861f0ef99a3b6f02c8ea4babad622f37f6861ac62da0d7f7c15ba94e7c90757520119c59419201f12e125bef13d5921fc60c80928081fb428dd", 0x1000}, 0x1006) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80800) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r1, r2}) close(r3) 03:35:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x2000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 756.067423] input: syz1 as /devices/virtual/input/input1500 [ 756.090333] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.096858] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)}]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x0, 0x9, 0x7f, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x1, 0x4}, 0x8) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r6, 0x611, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x9a5a, 0xfffffffffffffffc}, 0x68) [ 756.134965] input: syz1 as /devices/virtual/input/input1501 [ 756.145098] device bridge0 left promiscuous mode 03:35:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7fffedc7}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:26 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000100)={0x39f, 0xf, 0x0, {{0x0, 0x0, 0x2}}}, 0x18) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3fd4000000000000}, 'syz1\x00'}) [ 756.233130] XFS (loop0): Invalid superblock magic number [ 756.308968] input: syz1 as /devices/virtual/input/input1502 03:35:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 756.381459] input: syz1 as /devices/virtual/input/input1503 03:35:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3ad4000000000000}, 'syz1\x00'}) [ 756.546015] input: syz1 as /devices/virtual/input/input1504 [ 756.577372] input: syz1 as /devices/virtual/input/input1505 03:35:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'vlan0\x00', 0x801}) r1 = socket$nl_route(0x10, 0x3, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/117, 0xffffff55}], 0x1) dup3(r1, r0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:27 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0ffffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4ad4}, 'syz1\x00'}) 03:35:27 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 756.715668] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.722116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.728796] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.735196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 756.742243] device bridge0 entered promiscuous mode [ 756.748542] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 756.841778] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.849141] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.859054] input: syz1 as /devices/virtual/input/input1506 03:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x37000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 756.883622] device bridge0 left promiscuous mode 03:35:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000002, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffeb8, 0x4007ffd, 0x0, 0xfcfe) [ 756.928449] XFS (loop0): Invalid superblock magic number [ 756.953042] input: syz1 as /devices/virtual/input/input1507 03:35:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x74}, 'syz1\x00'}) 03:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0ffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 757.071009] IPVS: ftp: loaded support on port[0] = 21 03:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 757.150755] input: syz1 as /devices/virtual/input/input1508 [ 757.182451] input: syz1 as /devices/virtual/input/input1509 03:35:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3000000}, 'syz1\x00'}) 03:35:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7fffeff0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 757.315794] input: syz1 as /devices/virtual/input/input1510 [ 757.343691] input: syz1 as /devices/virtual/input/input1511 [ 757.503301] bridge0: port 2(bridge_slave_1) entered blocking state [ 757.509748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 757.516444] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.522799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 757.529527] device bridge0 entered promiscuous mode [ 757.535083] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 757.546689] device bridge0 left promiscuous mode [ 757.552005] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 757.559352] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 757.621782] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:28 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x101000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/ip_mr_vif\x00') r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcs\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000a80)={0x16, 0x98, 0xfa00, {&(0x7f0000000880), 0x0, r0, 0x18, 0x1, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) accept$packet(r2, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) fstat(r1, &(0x7f0000000a00)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000c40)=0xe8) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000600)='./file1\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f0000000f00)=ANY=[@ANYBLOB=',uid<', @ANYRESDEC=r5]) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r6, &(0x7f0000000140)='./file0\x00', r4, &(0x7f0000000240)='./file1\x00') ioctl$TCSETAW(r6, 0x5407, &(0x7f00000003c0)={0x4, 0xff, 0x8, 0x8001, 0x0, 0x7, 0x0, 0x3, 0x6, 0x11}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) bind$unix(r6, &(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x422002, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000001780)=ANY=[@ANYBLOB="d6d7e828f10eaea921050000fdd4dbd52978345a3b52e223ef2f0e73daca61a0ddccf19eafd18befe89e94571443fec321a188721a6e91bd20c32166d0041c2ed762d660af529f06007580521e6707000000000000009c3ae49568c4981a27cdb5a9f43102f4e9aa4451d3f8f1ce77e2079635cd93a7cc5536ba3b051516c164f38d870d8e9ad284615ffb452e75979901258ebccf40c91e53e00ebd07affd33eddfc297b8ee3530138dad603a43bb106291bed0be475da80881a1e1825d60e8b2416f4a48681539c0585b5f49804e245f2cae60c1abb15801fea6b2c2f4b598fc8febe9e14c19db638ac786b663b853790bddbfb93358e262ea0042e2234936233afbcb51da75fafce2c3996ee2cad4f03ee1056bcd862d7d337965665bc05a1ee10bbd529b92fa63d4cf1de708b91c6f509bcf360dcd94fa7017ea3fdd746a856c648ca3547f878ab07972130d0d8c975edc5e9abfee06f1478ddeefa31c741d5db32015d9c457b67a32e72178054dde82b97549510bec414cac4bc0b0b33eb85e1fd8bafe8d90472953e7e40c733b8ffc40c84ca05100c8267160510406bfe52d935890c66b9369e9badca0b458b3e69d82244e09eeb2159f3d69a4147714d8fa01c1131e6034877397b84f05c23d1fbe58041135ddd3d6117abc918b66f241e35e253bb86e34b31d4702846977f1891889b9fe7a7202fa148c9fad0f9e710dc74ce58d4d5639c936373fb51ee36e7054b653ff01325969f66dff0d8c3f2b1d1f3a0a69c3bedc79e0c1663288c87398c461d8859fdbef7ba4ce0c2906ecc3355feb9de1b09c7a693beac9746d78e37392b0"], &(0x7f0000000400)=0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}}, &(0x7f0000000340)=0x84) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r7, 0x40bc5311, &(0x7f0000000940)={0x69f0, 0x1, 'client1\x00', 0xffffffff80000005, "7127e580a69e06c5", "70b74dd0ddf5920d961e6c867053732601d6a67a62246c1721d61c5cbca79eb9", 0x1, 0x5}) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) write$P9_RFLUSH(r7, &(0x7f0000000ec0)={0x7}, 0x160) chdir(&(0x7f0000000640)='./file1\x00') socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) 03:35:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0ff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:28 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3bd4}, 'syz1\x00'}) 03:35:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 757.735857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 757.801004] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.808405] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.825281] input: syz1 as /devices/virtual/input/input1512 [ 757.839689] device bridge0 left promiscuous mode 03:35:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 757.887540] input: syz1 as /devices/virtual/input/input1513 [ 757.957358] XFS (loop0): Invalid superblock magic number [ 758.233585] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.240051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 758.246708] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.253074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 758.259889] device bridge0 entered promiscuous mode [ 758.500626] device bridge_slave_1 left promiscuous mode [ 758.506405] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.544845] device bridge_slave_0 left promiscuous mode [ 758.550283] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.628035] team0 (unregistering): Port device team_slave_1 removed [ 758.636488] team0 (unregistering): Port device team_slave_0 removed [ 758.646681] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 758.697127] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 758.764894] bond0 (unregistering): Released all slaves [ 758.869521] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.876059] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.883249] device bridge_slave_0 entered promiscuous mode [ 758.920968] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.927514] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.934740] device bridge_slave_1 entered promiscuous mode [ 758.970055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 759.005947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 759.114878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 759.153867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 759.302106] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 759.309648] team0: Port device team_slave_0 added [ 759.344433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 759.351622] team0: Port device team_slave_1 added [ 759.373610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 759.398449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 759.428734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 759.459999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 759.663673] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.670094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.676735] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.683067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.408520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.477517] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 760.548411] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 760.554720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 760.562295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 760.632770] 8021q: adding VLAN 0 to HW filter on device team0 03:35:31 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000100)=""/159, 0x9f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x29b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:35:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x52d40000}, 'syz1\x00'}) 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0ffffff7f0000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200)={0x0, 0x0, 0x5}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x80, 0x4) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffdd9, 0x0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 03:35:31 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:31 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 761.069577] input: syz1 as /devices/virtual/input/input1514 [ 761.088263] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.095551] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.109551] device bridge0 left promiscuous mode 03:35:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') flock(r0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) [ 761.120823] input: syz1 as /devices/virtual/input/input1515 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x200000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x1f000000}, 'syz1\x00'}) 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.324327] input: syz1 as /devices/virtual/input/input1516 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xff030000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7b0020}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.373374] input: syz1 as /devices/virtual/input/input1517 03:35:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x88}, 'syz1\x00'}) 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x37}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.521173] input: syz1 as /devices/virtual/input/input1518 03:35:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.561943] input: syz1 as /devices/virtual/input/input1519 03:35:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f0000000280)) [ 761.707506] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.713926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.720599] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.726956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.733581] device bridge0 entered promiscuous mode [ 761.739719] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:32 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x47d4}, 'syz1\x00'}) [ 761.813748] input: syz1 as /devices/virtual/input/input1520 [ 761.826377] input: syz1 as /devices/virtual/input/input1521 03:35:32 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) r2 = syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x107800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000780)=0x4) r3 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r3}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 03:35:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.857360] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.863822] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.891630] device bridge0 left promiscuous mode 03:35:32 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs#', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:32 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) r2 = syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x107800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000780)=0x4) r3 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r3}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 03:35:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x51d4}, 'syz1\x00'}) 03:35:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x3700000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 761.998072] input: syz1 as /devices/virtual/input/input1522 [ 762.034777] input: syz1 as /devices/virtual/input/input1523 [ 762.093240] IPVS: ftp: loaded support on port[0] = 21 03:35:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x46d4}, 'syz1\x00'}) 03:35:32 executing program 4: flistxattr(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0x148) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) futex(&(0x7f0000000100), 0x85, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0x0) 03:35:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xff03000000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 762.213535] input: syz1 as /devices/virtual/input/input1524 [ 762.264643] input: syz1 as /devices/virtual/input/input1525 03:35:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00ac730000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'ip6_vti0\x00', 0x400}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) [ 762.392490] bridge0: port 2(bridge_slave_1) entered blocking state [ 762.398918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 762.405528] bridge0: port 1(bridge_slave_0) entered blocking state [ 762.411856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 762.418688] device bridge0 entered promiscuous mode [ 762.424705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:32 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x6800}, 'syz1\x00'}) [ 762.516495] input: syz1 as /devices/virtual/input/input1526 [ 762.528215] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.535579] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.556460] device bridge0 left promiscuous mode [ 762.567679] input: syz1 as /devices/virtual/input/input1527 [ 762.773856] bridge0: port 2(bridge_slave_1) entered blocking state [ 762.780304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 762.786977] bridge0: port 1(bridge_slave_0) entered blocking state [ 762.793332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 762.800762] device bridge0 entered promiscuous mode [ 762.806946] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 762.815805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 763.074832] device bridge_slave_1 left promiscuous mode [ 763.080359] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.134900] device bridge_slave_0 left promiscuous mode [ 763.140344] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.197487] team0 (unregistering): Port device team_slave_1 removed [ 763.206289] team0 (unregistering): Port device team_slave_0 removed [ 763.215562] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 763.266912] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 763.334699] bond0 (unregistering): Released all slaves [ 763.429041] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.437069] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.443936] device bridge_slave_0 entered promiscuous mode [ 763.467669] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.474059] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.481341] device bridge_slave_1 entered promiscuous mode [ 763.504251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 763.527179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 763.632357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 763.669489] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 763.834899] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 763.842256] team0: Port device team_slave_0 added [ 763.877582] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 763.885250] team0: Port device team_slave_1 added [ 763.918937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 763.926240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 763.935155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 763.957668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 763.964579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 763.972260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 763.997085] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 764.004097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 764.012511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 764.046084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 764.053227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 764.069153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 764.289017] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.295442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 764.301998] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.308372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 764.315751] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 764.864354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 765.040961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 765.111685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 765.181894] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 765.188076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 765.195914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 765.265305] 8021q: adding VLAN 0 to HW filter on device team0 03:35:35 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) r2 = syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x107800) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500), &(0x7f0000000780)=0x4) r3 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r3}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x0, 0x101, 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 03:35:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0efff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:35 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x100000000000000}, 'syz1\x00'}) 03:35:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00ac730000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'ip6_vti0\x00', 0x400}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 03:35:35 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xa, 0x0, '90'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 765.701231] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.708436] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.723559] input: syz1 as /devices/virtual/input/input1528 [ 765.737007] device bridge0 left promiscuous mode 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:36 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000080)="24000000100007031dfffd946fa2830020200a0009000300001d85687f0000000400ff7e2800", 0x26}], 0x1}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8934, &(0x7f0000000100)={'team_slave_1\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000040)}}) write(r0, &(0x7f0000000200)="130000001000ffdde200f49ff60f050000230a00", 0x14) [ 765.756582] input: syz1 as /devices/virtual/input/input1529 03:35:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x47d4000000000000}, 'syz1\x00'}) 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xff03}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:36 executing program 5: [ 765.893513] XFS (loop0): Invalid superblock magic number [ 765.918814] input: syz1 as /devices/virtual/input/input1530 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffff8d}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 765.972547] input: syz1 as /devices/virtual/input/input1531 03:35:36 executing program 5: 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x20007b00}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 766.203130] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.209594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.216291] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.222647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 766.223380] device bridge0 entered promiscuous mode 03:35:36 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xa00000000000000}, 'syz1\x00'}) 03:35:36 executing program 4: 03:35:36 executing program 5: 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x200000c0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:36 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xa, 0x0, '90'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:36 executing program 5: [ 766.313416] input: syz1 as /devices/virtual/input/input1532 [ 766.347653] input: syz1 as /devices/virtual/input/input1533 03:35:36 executing program 4: [ 766.391454] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.397990] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.434764] device bridge0 left promiscuous mode 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xc7edff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:36 executing program 5: 03:35:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x42d4000000000000}, 'syz1\x00'}) 03:35:36 executing program 4: [ 766.514620] XFS (loop0): Invalid superblock magic number [ 766.552367] input: syz1 as /devices/virtual/input/input1534 [ 766.601255] input: syz1 as /devices/virtual/input/input1535 03:35:37 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:37 executing program 5: 03:35:37 executing program 4: 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0efff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x88ffffffff}, 'syz1\x00'}) [ 766.830124] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.836574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.843243] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.849635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 766.856549] device bridge0 entered promiscuous mode 03:35:37 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xa, 0x0, '90'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:37 executing program 4: 03:35:37 executing program 5: [ 766.906466] input: syz1 as /devices/virtual/input/input1536 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x2000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:37 executing program 4: [ 766.968402] input: syz1 as /devices/virtual/input/input1537 [ 766.997855] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.005395] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:37 executing program 5: [ 767.059524] XFS (loop0): Invalid superblock magic number [ 767.076964] device bridge0 left promiscuous mode 03:35:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2fd40000}, 'syz1\x00'}) [ 767.208214] input: syz1 as /devices/virtual/input/input1538 [ 767.243865] input: syz1 as /devices/virtual/input/input1539 03:35:37 executing program 4: 03:35:37 executing program 5: 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x3700}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:37 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x34d4}, 'syz1\x00'}) [ 767.394151] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.400611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 767.407295] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.413636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.421009] device bridge0 entered promiscuous mode 03:35:37 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xb, 0x0, '90\t'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:37 executing program 5: 03:35:37 executing program 4: [ 767.463061] input: syz1 as /devices/virtual/input/input1540 03:35:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000280)={0xd}) 03:35:37 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, &(0x7f0000000140)="18") lgetxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)=""/112, 0xfffffffffffffe09) 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x2}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 767.541693] input: syz1 as /devices/virtual/input/input1541 [ 767.575148] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.581663] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.621800] device bridge0 left promiscuous mode 03:35:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3dd4}, 'syz1\x00'}) 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7ffffffff000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 767.728942] input: syz1 as /devices/virtual/input/input1542 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7ffff000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 767.774619] input: syz1 as /devices/virtual/input/input1543 03:35:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x68}, 'syz1\x00'}) [ 767.881441] input: syz1 as /devices/virtual/input/input1544 [ 767.906439] input: syz1 as /devices/virtual/input/input1545 03:35:38 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:38 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xb, 0x0, '90\t'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd432}, 'syz1\x00'}) 03:35:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x2000, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000002, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x2338, 0x4008000, 0x0, 0xb4) [ 768.055986] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.062426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.069103] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.075492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.088557] device bridge0 entered promiscuous mode 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 768.180221] input: syz1 as /devices/virtual/input/input1546 [ 768.214435] input: syz1 as /devices/virtual/input/input1547 [ 768.224007] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.230508] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.268179] XFS (loop0): Invalid superblock magic number 03:35:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000440)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000009400000018029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848fc1c7e807f2889a8aa5eda146e9c9a8ce6ad1a0a4b9de624c47f7837459c49f9f888d2705c886dc49d79c50731b87fb47babed83fbad8ac5119c18f5909e69eeb39a623e4bbc7e95df08502364c64f024ad67e0fd9d1ecdc1eaa681ef0ce5bf93a03c"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0xc04, 0x0, 0xff}, 0xb) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) gettid() ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000002c0)={0x45, ""/69}) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000340)="ca34e3582f7e25cf7f06753a7a65af78f4c6df40c9b97beb9d7e5c87be4697530e757758a5add4", 0x27, 0xfffffffffffffffa) keyctl$read(0xb, 0x0, &(0x7f0000000140)=""/23, 0x17) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.', 0x3}, &(0x7f0000000240)='syz', 0xffffffffffffffff) 03:35:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents64(r1, &(0x7f00000002c0)=""/221, 0x2a) 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffff0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 768.277701] device bridge0 left promiscuous mode 03:35:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x38d4000000000000}, 'syz1\x00'}) 03:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 768.393414] input: syz1 as /devices/virtual/input/input1548 [ 768.415967] input: syz1 as /devices/virtual/input/input1549 [ 768.490794] IPVS: ftp: loaded support on port[0] = 21 03:35:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3cd4}, 'syz1\x00'}) [ 768.580415] input: syz1 as /devices/virtual/input/input1550 [ 768.604110] input: syz1 as /devices/virtual/input/input1551 03:35:39 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xc0000020}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 768.669187] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.675622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.682262] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.688662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.695794] device bridge0 entered promiscuous mode 03:35:39 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xb, 0x0, '90\t'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:39 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xa, 0x0, '90'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd42e}, 'syz1\x00'}) 03:35:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 768.855887] input: syz1 as /devices/virtual/input/input1552 [ 768.863088] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.871882] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.900534] input: syz1 as /devices/virtual/input/input1553 [ 768.947731] XFS (loop0): Invalid superblock magic number [ 769.098469] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.105005] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.111892] device bridge0 left promiscuous mode [ 769.213015] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.219425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 769.226364] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.232711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 769.239400] device bridge0 entered promiscuous mode [ 769.245768] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.252115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 769.258802] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.265206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 769.271860] device bridge0 entered promiscuous mode [ 769.498426] device bridge_slave_1 left promiscuous mode [ 769.503945] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.544781] device bridge_slave_0 left promiscuous mode [ 769.550227] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.607363] team0 (unregistering): Port device team_slave_1 removed [ 769.616216] team0 (unregistering): Port device team_slave_0 removed [ 769.624609] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 769.666470] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 769.744519] bond0 (unregistering): Released all slaves [ 769.890001] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.896560] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.903410] device bridge_slave_0 entered promiscuous mode [ 769.927068] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.933467] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.946210] device bridge_slave_1 entered promiscuous mode [ 769.980555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 770.015416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 770.117214] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 770.155490] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 770.314916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 770.322230] team0: Port device team_slave_0 added [ 770.345449] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 770.352512] team0: Port device team_slave_1 added [ 770.375875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 770.399556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 770.435462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 770.463795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 770.677283] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.683642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.690290] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.696648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 771.405722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 771.475506] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 771.545336] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 771.551463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 771.559150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 771.628169] 8021q: adding VLAN 0 to HW filter on device team0 03:35:42 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x8dffffff}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4ed4000000000000}, 'syz1\x00'}) 03:35:42 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xa, 0x0, '90'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:42 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs?', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:42 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 772.067701] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.074237] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.081151] input: syz1 as /devices/virtual/input/input1554 [ 772.094357] device bridge0 left promiscuous mode [ 772.109065] input: syz1 as /devices/virtual/input/input1555 03:35:42 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x57d40000}, 'syz1\x00'}) 03:35:42 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x8dffffff00000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 772.271437] input: syz1 as /devices/virtual/input/input1556 03:35:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000800)=""/4096, 0x1000) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000280)={"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"}) shmget(0x1, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000780)=@assoc_value, &(0x7f00000007c0)=0x8) r1 = semget(0x1, 0x7, 0x200) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000680)={&(0x7f0000ffc000/0x4000)=nil, 0x3, 0x5, 0x51, &(0x7f0000002000/0x1000)=nil, 0x1}) semtimedop(r1, &(0x7f00000001c0)=[{0x7, 0xfe, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000026c00000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f4, &(0x7f0000000740)="7c9b2e60f31b7284c53a671ab0eb3936247fc0a474fa6beabe04abcd1744724c220f4fc574c7ab0b2980cf8be424d4e74b") ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000700), &(0x7f00000006c0)=0x8) [ 772.331287] input: syz1 as /devices/virtual/input/input1557 03:35:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xf0ff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd44a}, 'syz1\x00'}) 03:35:42 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="010000000000000000001c0c5e90d33eb50865365a4eae4c80a13ee52c6ec692c73cc0e9c8e94d3314f73737c907674803044dcd4c628f4437e7c09f9b05f9df1ea1f8e3fc3a3aba7c224354d36c633ba953df0ec615a356c4993f71ade24e0df9c9abbec8b70304d01a073fa0b2e426fbf7fb640a66a663afd13321b24e5e03c92225a1fca525723128d11906219cae509fd54c7063ad38aa632eef572f630ba6f3800a629f8496e34fc4a6b9b159f8217e8ada4811a504b93125ccbf9c3154fb363413c3", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="000000000100006e2a0000007f00000068759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe819a69b9"], 0x80}}, 0x0) [ 772.529217] input: syz1 as /devices/virtual/input/input1558 [ 772.595024] input: syz1 as /devices/virtual/input/input1559 [ 772.802872] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.810537] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.818523] device bridge0 left promiscuous mode [ 772.924907] bridge0: port 2(bridge_slave_1) entered blocking state [ 772.931364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 772.938055] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.944441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 772.951096] device bridge0 entered promiscuous mode [ 772.956866] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 772.964079] bridge0: port 2(bridge_slave_1) entered blocking state 03:35:43 executing program 4: r0 = socket$kcm(0x29, 0x200000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000004640)={&(0x7f0000000040), 0xc, &(0x7f0000004600)={&(0x7f0000003d00)={0x14}, 0x14}}, 0x0) recvfrom$packet(r1, &(0x7f0000000680)=""/4096, 0x1000, 0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="83124327bcea"}, 0x14) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[]}}, 0x20044000) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@broadcast, @remote, 0x0}, &(0x7f0000000200)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000340)={@mcast1, r3}, 0x14) sendmmsg(r1, &(0x7f0000000540)=[{{&(0x7f00000002c0)=@nl, 0x80, &(0x7f0000000500)}}], 0x1, 0x0) 03:35:43 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000012c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v1={0x2, "0f3a71e3be60cf72c9d0f7ecf9fc07e5a781"}, 0x13, 0x2) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)="70726f6300a21549612e07ee8f0671d712fa2824ab7351724056e37702dce28f88aa", 0x0, &(0x7f00000012c0)) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0xc0423, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read'}}]}}) 03:35:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xc000002000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd43b}, 'syz1\x00'}) 03:35:43 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 772.970479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 772.977168] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.983525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 772.994353] device bridge0 entered promiscuous mode 03:35:43 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 773.056145] input: syz1 as /devices/virtual/input/input1560 [ 773.095391] input: syz1 as /devices/virtual/input/input1561 03:35:43 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x7b002000000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x30d4}, 'syz1\x00'}) 03:35:43 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:43 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 773.266612] input: syz1 as /devices/virtual/input/input1562 [ 773.309764] input: syz1 as /devices/virtual/input/input1563 [ 773.784665] device bridge_slave_1 left promiscuous mode [ 773.790202] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.844778] device bridge_slave_0 left promiscuous mode [ 773.850280] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.897677] team0 (unregistering): Port device team_slave_1 removed [ 773.906312] team0 (unregistering): Port device team_slave_0 removed [ 773.914806] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 773.936834] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 773.985198] bond0 (unregistering): Released all slaves 03:35:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) ioctl$UI_SET_SWBIT(r1, 0x8008550e, 0x2070dffe) 03:35:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xc7edff7f}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7400000000000000}, 'syz1\x00'}) 03:35:44 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:44 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673b3", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:44 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 774.074497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:35:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:44 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 774.134367] input: syz1 as /devices/virtual/input/input1564 [ 774.161838] input: syz1 as /devices/virtual/input/input1565 03:35:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7fffffff, 0x141000) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000140)={0x0, 0x80000000, 0x8, &(0x7f0000000100)=0x5}) 03:35:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x37d4000000000000}, 'syz1\x00'}) 03:35:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:44 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:44 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:44 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x1fff5, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/145) getgroups(0x9, &(0x7f0000000600)=[0x0, 0xee01, 0x0, 0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setgroups(0x3, &(0x7f0000000640)=[r3, r2, r4]) write$UHID_CREATE(r1, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000200)=""/244, 0xf4, 0x80000000000, 0x10001, 0x1, 0x65f3}, 0x120) shmat(r0, &(0x7f0000000000/0x2000)=nil, 0x4000) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000440)=0x86e1, &(0x7f0000000480)=0x1) pipe2(&(0x7f0000000140), 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) [ 774.385506] input: syz1 as /devices/virtual/input/input1566 [ 774.458437] input: syz1 as /devices/virtual/input/input1567 [ 774.481198] IPVS: ftp: loaded support on port[0] = 21 03:35:44 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:44 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 774.598944] XFS (loop0): Invalid superblock magic number [ 775.210428] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.217203] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.224004] device bridge_slave_0 entered promiscuous mode [ 775.258492] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.264966] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.272279] device bridge_slave_1 entered promiscuous mode [ 775.295398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 775.318044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 775.380380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 775.403987] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 775.496346] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 775.503405] team0: Port device team_slave_0 added [ 775.525022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 775.532042] team0: Port device team_slave_1 added [ 775.553915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 775.578297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 775.601450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 775.625169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 775.822544] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.828944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 775.835584] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.841936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.531906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 776.601060] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 776.668561] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 776.675152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 776.682061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 776.750662] 8021q: adding VLAN 0 to HW filter on device team0 03:35:47 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x1f00}, 'syz1\x00'}) 03:35:47 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:47 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-des3_ede-asm\x00'}, 0x58) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)='\x00', 0x1}]) 03:35:47 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 777.183893] input: syz1 as /devices/virtual/input/input1568 [ 777.219560] input: syz1 as /devices/virtual/input/input1569 03:35:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:47 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 777.298824] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.305319] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4bd4}, 'syz1\x00'}) 03:35:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 777.340766] device bridge0 left promiscuous mode [ 777.347296] XFS (loop0): Invalid superblock magic number [ 777.369564] input: syz1 as /devices/virtual/input/input1570 [ 777.416301] input: syz1 as /devices/virtual/input/input1571 03:35:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 777.635957] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.642385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 777.649075] bridge0: port 1(bridge_slave_0) entered blocking state [ 777.655437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 777.662223] device bridge0 entered promiscuous mode [ 777.667799] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$sock_bt(r0, 0xdd1f, &(0x7f00000000c0)="72deadf35a220dcc31e26ebdca8340a13c322b585c02632b7e4af46b38a16e868ce65ca815b23e5323783f3eeb1d0aa1f6b78b358c6662eb53e5ae2c246dbbd9d836e2043479043f511eb6a3b872bbb984965cc3dea050d040ddfaa9741ae3bec1") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40100000003, 0x87) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000000)={0x7, [0x3, 0x7f, 0x7f, 0x4392, 0x1, 0x2, 0x2]}) 03:35:48 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4c00}, 'syz1\x00'}) 03:35:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000000c0)="b14be18986858966a00f79b32ea219455974d18b11644352835d950723f06878e0582d521c6db25050fd580ef7ef7a6b9b0d8f41c2e69728286bd38e2c02968596cd34") chdir(&(0x7f0000000080)='./file0\x00') r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80000) accept(r0, &(0x7f0000000180)=@nfc, &(0x7f0000000200)=0x80) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) umount2(&(0x7f0000b1d000)='.', 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000280)={0x4, 0x7e, 0x1, 'queue1\x00', 0x73}) pivot_root(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') 03:35:48 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 777.784699] input: syz1 as /devices/virtual/input/input1572 [ 777.792593] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.799096] bridge0: port 1(bridge_slave_0) entered disabled state [ 777.819402] device bridge0 left promiscuous mode 03:35:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f00000000c0)=0x1, 0xfd41) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r2, &(0x7f00000024c0)=[{{&(0x7f0000001bc0)=@rc, 0x80, &(0x7f0000001cc0), 0x0, &(0x7f0000001d00)=""/219, 0xdb, 0x3}}], 0x1, 0x0, 0x0) [ 777.844625] input: syz1 as /devices/virtual/input/input1573 03:35:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x10}, 'syz1\x00'}) [ 777.917974] XFS (loop0): Invalid superblock magic number 03:35:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 777.971580] IPVS: ftp: loaded support on port[0] = 21 03:35:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 778.012639] input: syz1 as /devices/virtual/input/input1574 [ 778.046017] input: syz1 as /devices/virtual/input/input1575 03:35:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 778.121819] bridge0: port 2(bridge_slave_1) entered blocking state [ 778.128271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 778.134959] bridge0: port 1(bridge_slave_0) entered blocking state [ 778.141323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 778.150820] device bridge0 entered promiscuous mode [ 778.158274] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 778.515195] device bridge_slave_1 left promiscuous mode [ 778.520703] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.564885] device bridge_slave_0 left promiscuous mode [ 778.570338] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.626783] team0 (unregistering): Port device team_slave_1 removed [ 778.635783] team0 (unregistering): Port device team_slave_0 removed [ 778.644025] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 778.686845] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 778.734404] bond0 (unregistering): Released all slaves [ 778.801528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 778.888062] bridge0: port 1(bridge_slave_0) entered blocking state [ 778.895199] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.902426] device bridge_slave_0 entered promiscuous mode [ 778.938001] bridge0: port 2(bridge_slave_1) entered blocking state [ 778.944700] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.952874] device bridge_slave_1 entered promiscuous mode [ 778.987679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 779.023054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 779.129721] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 779.168701] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 779.310293] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 779.317558] team0: Port device team_slave_0 added [ 779.339911] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 779.347535] team0: Port device team_slave_1 added [ 779.380248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 779.407559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 779.432070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 779.455837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 779.668032] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.674414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.680987] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.687365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.383406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 780.451550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 780.521027] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 780.527203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 780.534111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 780.605318] 8021q: adding VLAN 0 to HW filter on device team0 03:35:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x4000000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) r1 = socket(0x2, 0x8080b, 0x1) recvmsg$kcm(r1, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000800)=""/26, 0x1a}, {&(0x7f0000000840)=""/196, 0xc4}, {&(0x7f0000000940)=""/158, 0x9e}, {&(0x7f0000000a00)=""/58, 0x3a}, {&(0x7f0000000a40)=""/12, 0xc}, {&(0x7f0000000a80)=""/7, 0x7}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/31, 0x1f}, {&(0x7f0000000b00)=""/157, 0x9d}], 0x9, &(0x7f0000000c80)=""/225, 0xe1, 0xffffffffffff7013}, 0x40012000) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000dc0)) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000e40)={0x0, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e21}, 0x0, 0x4, 0x40004000000, 0xa296, 0x1f, &(0x7f0000000e00)='team0\x00', 0x2, 0xdb, 0x9}) semget(0x2, 0x0, 0x208) fchdir(r0) semget(0x2, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)="6e65742f726f7574650040cf185fa026fc558d85cefd24d86f2ec7e5b44357be8344b9b1f33ba7aeb62bcca42258deee0f4b5863cc47bdceadf6c6e295da7869e9db223bac98d8425cd35330f6f5280758e5afccc1f497be62181572c2abfb597b3661401c06c38c0a99cf7e0c4429aabe64ca83e6ecc44fede0ad15aec1721326bbc7ca8ad07177bbf4ccb077fdee263bd940b16457eb302756c42eade34adb4d6b8f384e48d760ac55fb01e57f99e80abb63e73a22794d0825e2ca4a16f5bad8f5797293b55e33626bbc1d9765fedaa41b9c7007d752ac5902053313448a4e78aa35a1b7ae548100") preadv(r2, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000680)=""/27, 0x1b}, {&(0x7f00000006c0)=""/43, 0x2b}, {&(0x7f0000000700)=""/144, 0x90}], 0x4, 0x4c000000) r3 = getpgid(0xffffffffffffffff) get_robust_list(r3, &(0x7f00000002c0)=&(0x7f0000000280)={&(0x7f00000000c0)={&(0x7f0000000040)}, 0x0, &(0x7f0000000240)={&(0x7f0000000100)}}, &(0x7f0000000300)=0x18) 03:35:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd442}, 'syz1\x00'}) 03:35:51 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:51 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xfff, 0x80000) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'trusted.', ']\x00'}, &(0x7f0000000100)='\x00', 0xffffffffffffffaa, 0x3) recvmmsg(r1, &(0x7f0000003a80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1, &(0x7f0000000340)=""/237, 0xed, 0x1}, 0x8}, {{&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000004c0)}, {&(0x7f0000000500)=""/150, 0x96}, {&(0x7f00000005c0)=""/168, 0xa8}, {&(0x7f0000000680)=""/83, 0x53}, {&(0x7f0000000700)=""/73, 0x49}, {&(0x7f0000000780)=""/30, 0x1e}], 0x6, &(0x7f0000000840)=""/39, 0x27, 0x1}}, {{&(0x7f0000000880)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000900)=""/122, 0x7a}, {&(0x7f0000000980)=""/147, 0x93}, {&(0x7f0000000a40)=""/77, 0x4d}, {&(0x7f0000000ac0)=""/153, 0x99}, {&(0x7f0000000b80)=""/173, 0xad}], 0x5, &(0x7f0000000cc0)=""/69, 0x45, 0x8}, 0x240000000000000}, {{&(0x7f0000000d40)=@alg, 0x80, &(0x7f0000003100)=[{&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/187, 0xbb}, {&(0x7f0000001e80)=""/4, 0x4}, {&(0x7f0000001ec0)=""/184, 0xb8}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000002f80)=""/218, 0xda}, {&(0x7f0000003080)=""/7, 0x7}, {&(0x7f00000030c0)}], 0x8, &(0x7f0000003180)=""/46, 0x2e, 0x101760e4}, 0xfffffffffffffff7}, {{&(0x7f00000031c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003240)=""/163, 0xa3}, {&(0x7f0000003300)=""/145, 0x91}], 0x2, &(0x7f0000003400)=""/32, 0x20, 0x7}, 0x1ff}, {{&(0x7f0000003440)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000003540)=[{&(0x7f00000034c0)=""/125, 0x7d}], 0x1, &(0x7f0000003580)=""/147, 0x93, 0x10001}, 0xd24}, {{&(0x7f0000003640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000039c0)=[{&(0x7f00000036c0)=""/29, 0x1d}, {&(0x7f0000003700)=""/191, 0xbf}, {&(0x7f00000037c0)=""/174, 0xae}, {&(0x7f0000003880)=""/98, 0x62}, {&(0x7f0000003900)=""/133, 0x85}], 0x5, &(0x7f0000003a40)=""/55, 0x37, 0x4}, 0x6}], 0x7, 0x2000, &(0x7f0000003c40)={0x77359400}) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x80}}, 0x0) 03:35:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 781.033624] input: syz1 as /devices/virtual/input/input1576 [ 781.065649] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.072168] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 781.086284] input: syz1 as /devices/virtual/input/input1577 [ 781.098049] device bridge0 left promiscuous mode 03:35:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup(r1) 03:35:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x43d40000}, 'syz1\x00'}) 03:35:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 781.265301] input: syz1 as /devices/virtual/input/input1578 [ 781.290606] input: syz1 as /devices/virtual/input/input1579 03:35:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xa}, 'syz1\x00'}) [ 781.404915] input: syz1 as /devices/virtual/input/input1580 [ 781.431052] input: syz1 as /devices/virtual/input/input1581 [ 781.551905] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.558338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 781.565029] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.571399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 781.584632] device bridge0 entered promiscuous mode [ 781.590121] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:35:52 executing program 5: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x51) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000600)='logon\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)='$', 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000840)=[{&(0x7f0000000780)="d213f8d249c0ab920a0f40116919fb3b951516bc7cc3edba6415cbab15851ff9e96e239e747525717e636c8c97b12cf05746929c0849df2a3081aeb92308f1daf459d3a5", 0x44}], 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x3}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000500)={0x7fffffff, 0x0, 0x401, 0x4, r2}, &(0x7f0000000540)=0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000380)={0x58, 0x7d, 0x1, {0x0, 0x51, 0x0, 0x6, {0x80, 0x2}, 0x40000, 0xfffffffffffffffe, 0x3, 0x0, 0x1, '$', 0x4, 'nfs\x00', 0x8, 'gretap0\x00', 0x11, '/dev/qat_adf_ctl\x00'}}, 0x58) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000005c0)={0x28, 0x2, 0x0, {0x3, 0x8001, 0x2}}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) sendmsg(r0, &(0x7f0000000ec0)={&(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @broadcast}, 0x3, 0x2, 0x4, 0x1}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000dc0)="af7dc29b7b3a55e01266267a4aa8fb3a5543fc9c8e8260ff59a6570e2d1b53431d3f3927a0d4c9c20a22541687e3a0c2107da9c9eb0d6131f6", 0x39}], 0x1, &(0x7f0000000e80), 0x0, 0xc5}, 0x4040) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() write$UHID_INPUT2(r0, &(0x7f0000000400), 0x6) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r3) 03:35:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2000000002, 0xffffffffffffffe5, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffff0819a93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x21}, 0xa68}}, 0xa631, 0x65fb, 0x2, "8e459f118d9c8e7e3857c29d13899ef3cb8a54f4d0e04d4571e84ed5b4adb4fc65417c739e594bd98e4f5afc227af58e5612e1739093f3899ad1d5fad6a8c21cabbf1a9c67e564b1a1807ec9008d54a4"}, 0xd8) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) pwrite64(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18}, 0x18) 03:35:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7a0c000000000000}, 'syz1\x00'}) 03:35:52 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:52 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:52 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x202000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='clear_refs\x00') memfd_create(&(0x7f0000000140)='cgroup\x00', 0x6) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x6, 0x400) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KDENABIO(r0, 0x4b36) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000015c0)='mounts\x00') setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), 0x4) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1, 0x40}, {0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x247}, {r2}], 0x6, &(0x7f0000000240), &(0x7f0000000280)={0x20}, 0x8) [ 781.719274] input: syz1 as /devices/virtual/input/input1582 [ 781.730250] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.737011] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.782013] device bridge0 left promiscuous mode [ 781.798526] input: syz1 as /devices/virtual/input/input1583 03:35:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7f00}, 'syz1\x00'}) [ 781.961725] IPVS: ftp: loaded support on port[0] = 21 03:35:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:52 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000200)=0x1d4e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_wait(r2, &(0x7f0000000180)=[{}], 0x1, 0x79d3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 782.022580] input: syz1 as /devices/virtual/input/input1584 03:35:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 782.104490] input: syz1 as /devices/virtual/input/input1585 [ 782.216611] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.223034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.229739] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.236143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.267456] device bridge0 entered promiscuous mode [ 782.273824] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 782.554320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 782.562379] device bridge_slave_1 left promiscuous mode [ 782.568141] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.614891] device bridge_slave_0 left promiscuous mode [ 782.620418] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.707712] team0 (unregistering): Port device team_slave_1 removed [ 782.716464] team0 (unregistering): Port device team_slave_0 removed [ 782.725717] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 782.767038] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 782.815527] bond0 (unregistering): Released all slaves [ 783.020304] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.026812] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.034031] device bridge_slave_0 entered promiscuous mode [ 783.083756] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.090282] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.097630] device bridge_slave_1 entered promiscuous mode [ 783.133037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 783.168430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 783.272324] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 783.311459] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 783.456450] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 783.463571] team0: Port device team_slave_0 added [ 783.486888] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 783.494004] team0: Port device team_slave_1 added [ 783.516778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 783.545059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 783.581099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 783.588461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 783.597265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 783.616734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 783.623817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 783.633063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 783.831066] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.837460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 783.844024] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.850393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 783.857644] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 784.574621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 784.614467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 784.656508] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 784.727323] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 784.733440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 784.740819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 784.812839] 8021q: adding VLAN 0 to HW filter on device team0 03:35:55 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x5, 0x48100) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x4, 0xffffffffffffffff}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)=""/50) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000040)={0x0, 0x2000000001, 0x0, &(0x7f0000000080)}) 03:35:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:55 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673b6", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x56d40000}, 'syz1\x00'}) 03:35:55 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000200)=0x1d4e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_wait(r2, &(0x7f0000000180)=[{}], 0x1, 0x79d3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 785.261933] input: syz1 as /devices/virtual/input/input1586 [ 785.272922] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.280202] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 785.311398] device bridge0 left promiscuous mode [ 785.319261] input: syz1 as /devices/virtual/input/input1587 03:35:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x34d40000}, 'syz1\x00'}) 03:35:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 785.502421] input: syz1 as /devices/virtual/input/input1588 [ 785.564746] input: syz1 as /devices/virtual/input/input1589 03:35:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7400}, 'syz1\x00'}) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 785.755251] input: syz1 as /devices/virtual/input/input1590 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 785.804705] input: syz1 as /devices/virtual/input/input1591 [ 785.886504] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.892942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.899644] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.906058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.919583] device bridge0 entered promiscuous mode 03:35:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd437}, 'syz1\x00'}) 03:35:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00002f5ff8)={0xffffffffffffffff}) bind$unix(r2, &(0x7f0000968ff6)=@file={0x1, './file0\x00'}, 0xa) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000002c0)=""/248, 0xf8}}], 0x1, 0x0, &(0x7f00000001c0)) sendmmsg$unix(r1, &(0x7f00000034c0)=[{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000500), 0x0, &(0x7f0000000580)=[@rights={0x18, 0x1, 0x1, [r3]}], 0x18}], 0x1, 0x0) r4 = msgget$private(0x0, 0x280) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000080)=""/199) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:56 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:56 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 786.030792] input: syz1 as /devices/virtual/input/input1592 [ 786.046387] bridge0: port 2(bridge_slave_1) entered disabled state [ 786.053829] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000100)=0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000200)=0x1d4e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) epoll_wait(r2, &(0x7f0000000180)=[{}], 0x1, 0x79d3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 786.089655] input: syz1 as /devices/virtual/input/input1593 [ 786.116363] device bridge0 left promiscuous mode 03:35:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3bd4000000000000}, 'syz1\x00'}) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 786.191786] XFS (loop0): Invalid superblock magic number [ 786.221186] IPVS: ftp: loaded support on port[0] = 21 [ 786.264880] input: syz1 as /devices/virtual/input/input1594 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 786.317240] input: syz1 as /devices/virtual/input/input1595 03:35:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x36d40000}, 'syz1\x00'}) 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 786.470448] input: syz1 as /devices/virtual/input/input1596 [ 786.537867] input: syz1 as /devices/virtual/input/input1597 03:35:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 786.746779] bridge0: port 2(bridge_slave_1) entered blocking state [ 786.753231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 786.759936] bridge0: port 1(bridge_slave_0) entered blocking state [ 786.766323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 786.772995] device bridge0 entered promiscuous mode [ 787.104639] device bridge_slave_1 left promiscuous mode [ 787.110167] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.134799] device bridge_slave_0 left promiscuous mode [ 787.140217] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.187294] team0 (unregistering): Port device team_slave_1 removed [ 787.196422] team0 (unregistering): Port device team_slave_0 removed [ 787.205865] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 787.256881] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 787.324248] bond0 (unregistering): Released all slaves [ 787.438362] bridge0: port 1(bridge_slave_0) entered blocking state [ 787.444990] bridge0: port 1(bridge_slave_0) entered disabled state [ 787.452304] device bridge_slave_0 entered promiscuous mode [ 787.487168] bridge0: port 2(bridge_slave_1) entered blocking state [ 787.493598] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.501586] device bridge_slave_1 entered promiscuous mode [ 787.536924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 787.571792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 787.677023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 787.714729] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 787.862343] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 787.869749] team0: Port device team_slave_0 added [ 787.892431] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 787.899555] team0: Port device team_slave_1 added [ 787.926412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 787.960379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 787.967495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 787.975390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 787.998119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 788.005192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 788.012950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 788.037426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 788.044775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 788.055549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 788.250824] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.257210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.263760] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.270132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.277610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 788.974563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 789.014410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 789.050092] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 789.119628] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 789.126034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 789.132920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 789.202116] 8021q: adding VLAN 0 to HW filter on device team0 03:35:59 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000004c0)) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000080)="6059ae416556c674b30084e004000a009003019eca00bc9ddf2c5d2ebc3f0012a7fc", 0x22, 0x3ff}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0xc202, 0x151) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/167) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x10000, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000400)={@nl=@kern={0x10, 0x0, 0x0, 0x80810}, {&(0x7f0000000340)=""/133, 0x85}, &(0x7f0000000200), 0x2}, 0xa0) 03:35:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x300}, 'syz1\x00'}) 03:35:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:59 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:35:59 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:35:59 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 789.635543] input: syz1 as /devices/virtual/input/input1598 [ 789.654095] input: syz1 as /devices/virtual/input/input1599 [ 789.662186] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.669518] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:00 executing program 5: socketpair(0xa, 0x5, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000200)=0x1, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000001040)="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") r3 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000040)=""/140, &(0x7f0000000140)=0x8c) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000002540)=0x4, 0x1ac52be96803267c) write$binfmt_aout(r0, &(0x7f0000001140)={{0x10f, 0x89b7, 0x6, 0x1000000000034c, 0x215, 0x2, 0x267, 0x2}, "13dccd0c8d9ff8f7576f786d81c3242f8ae22b00797ee71648ea491ff502df4a19cdac1f1a3dcf4b64a322f83c03bf9369507933a69d843d4621242867cf834908f61103f87ce22a70ab422b835cd581e36161cb30f798d34d2d6f66c2552edccbd8d50a19253f9e71b3757b6d706cde40b7e71b23004c1c8198761053968183e74d8116eacaf47676ab216a50d6a2047e44c4", [[], []]}, 0x2b3) getpid() bind$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r4, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f0000000000)={0xa, 0x2}, 0x1c) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000, 0x2, &(0x7f0000ff9000/0x1000)=nil) vmsplice(r2, &(0x7f00000001c0)=[{&(0x7f0000000300)="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", 0xd01}], 0x1, 0x0) splice(r1, 0x0, r4, 0x0, 0xab11, 0x0) r5 = add_key$user(&(0x7f0000001400)='user\x00', &(0x7f0000001440)={'syz', 0x1}, &(0x7f0000001480)="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", 0x1000, 0xfffffffffffffffe) r6 = request_key(&(0x7f0000002480)='asymmetric\x00', &(0x7f00000024c0)={'syz', 0x3}, &(0x7f0000002500)='nodev\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r5, 0x2, 0x2, r6) 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 789.703776] device bridge0 left promiscuous mode 03:36:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2000}, 'syz1\x00'}) [ 789.743814] XFS (loop0): Invalid superblock magic number 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 789.857861] input: syz1 as /devices/virtual/input/input1600 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 789.902364] input: syz1 as /devices/virtual/input/input1601 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd436}, 'syz1\x00'}) [ 790.041318] input: syz1 as /devices/virtual/input/input1602 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 790.087241] input: syz1 as /devices/virtual/input/input1603 03:36:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x51d4000000000000}, 'syz1\x00'}) [ 790.205182] input: syz1 as /devices/virtual/input/input1604 [ 790.244039] input: syz1 as /devices/virtual/input/input1605 [ 790.371092] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.378466] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.386206] device bridge0 left promiscuous mode [ 790.476730] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.483175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.489858] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.496220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.502898] device bridge0 entered promiscuous mode [ 790.509107] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.515516] bridge0: port 2(bridge_slave_1) entered forwarding state 03:36:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x40000000}, 'syz1\x00'}) 03:36:00 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 790.522147] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.528569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.536087] device bridge0 entered promiscuous mode [ 790.588089] input: syz1 as /devices/virtual/input/input1606 [ 790.616610] input: syz1 as /devices/virtual/input/input1607 03:36:01 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:01 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:01 executing program 5: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x5, 0xf2e2, 0x1}) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = socket$inet6(0xa, 0x4, 0x1) dup2(r1, r2) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @random="e829f650db0f", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0xe4c, 0xc9e]}) getuid() 03:36:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x53d40000}, 'syz1\x00'}) [ 790.720546] bridge0: port 2(bridge_slave_1) entered disabled state [ 790.727679] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.745231] device bridge0 left promiscuous mode [ 790.772570] XFS (loop0): Invalid superblock magic number 03:36:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 790.793590] input: syz1 as /devices/virtual/input/input1608 [ 790.833037] input: syz1 as /devices/virtual/input/input1609 03:36:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd435}, 'syz1\x00'}) [ 790.907622] IPVS: ftp: loaded support on port[0] = 21 03:36:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 790.978844] input: syz1 as /devices/virtual/input/input1610 [ 790.996424] input: syz1 as /devices/virtual/input/input1611 03:36:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4c}, 'syz1\x00'}) 03:36:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 791.167355] input: syz1 as /devices/virtual/input/input1612 [ 791.216391] input: syz1 as /devices/virtual/input/input1613 03:36:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 791.443701] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.451005] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.458209] device bridge0 left promiscuous mode [ 791.580105] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.580136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.593148] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.599543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.606416] device bridge0 entered promiscuous mode [ 791.611844] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 791.618626] bridge0: port 2(bridge_slave_1) entered blocking state 03:36:01 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:02 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2}, 'syz1\x00'}) [ 791.625029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.631664] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.638063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.646302] device bridge0 entered promiscuous mode [ 791.651979] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 791.734404] input: syz1 as /devices/virtual/input/input1614 [ 791.735703] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.747716] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.772971] device bridge0 left promiscuous mode [ 791.787023] input: syz1 as /devices/virtual/input/input1615 [ 791.854285] XFS (loop0): Invalid superblock magic number [ 791.948150] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.954601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.961269] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.967656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.975751] device bridge0 entered promiscuous mode [ 791.981490] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 792.164961] device bridge_slave_1 left promiscuous mode [ 792.170485] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.214901] device bridge_slave_0 left promiscuous mode [ 792.220350] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.288221] team0 (unregistering): Port device team_slave_1 removed [ 792.296836] team0 (unregistering): Port device team_slave_0 removed [ 792.306643] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 792.376655] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 792.458603] bond0 (unregistering): Released all slaves [ 792.584346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 792.591557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 792.704412] bridge0: port 1(bridge_slave_0) entered blocking state [ 792.710862] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.718852] device bridge_slave_0 entered promiscuous mode [ 792.754616] bridge0: port 2(bridge_slave_1) entered blocking state [ 792.761074] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.769035] device bridge_slave_1 entered promiscuous mode [ 792.804657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 792.840796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 792.947355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 792.985020] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 793.101772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 793.109095] team0: Port device team_slave_0 added [ 793.130776] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 793.137862] team0: Port device team_slave_1 added [ 793.159955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 793.189940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 793.220097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 793.244579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 793.443501] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.449893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 793.456540] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.462881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 794.169080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 794.237909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 794.307364] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 794.313582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 794.321223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 794.390765] 8021q: adding VLAN 0 to HW filter on device team0 03:36:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/28, 0x27c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0xc1, @tick, 0x0, {0x4}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x0, 0x1}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:05 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2fd4}, 'syz1\x00'}) 03:36:05 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x2) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000002a80)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x7048, &(0x7f0000002ac0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000003e80), 0x820, &(0x7f0000002c40)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}, {@stripe={'stripe'}}]}) 03:36:05 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\t', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 794.831148] input: syz1 as /devices/virtual/input/input1616 [ 794.840591] bridge0: port 2(bridge_slave_1) entered disabled state [ 794.847081] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f0000000200)=0x2f, 0x800) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000180)={0x0, @broadcast, 0x4e23, 0x2, 'sed\x00', 0x4, 0x1f, 0x67}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000080)=""/86, &(0x7f0000000140)=0x56) [ 794.898920] input: syz1 as /devices/virtual/input/input1617 [ 794.915272] device bridge0 left promiscuous mode 03:36:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xfdfdffff00000000}, 'syz1\x00'}) [ 795.003924] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1,stripe=0x0000000000000000,,errors=continue 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 795.079534] input: syz1 as /devices/virtual/input/input1618 [ 795.093124] input: syz1 as /devices/virtual/input/input1619 [ 795.123106] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1,stripe=0x0000000000000000,,errors=continue 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000300)=0x1, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:36:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x20000000}, 'syz1\x00'}) 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7ffffffff000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 795.306070] input: syz1 as /devices/virtual/input/input1620 [ 795.334694] input: syz1 as /devices/virtual/input/input1621 [ 795.501130] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.507571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 795.514297] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.520671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 795.530634] device bridge0 entered promiscuous mode [ 795.537258] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:05 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x51d40000}, 'syz1\x00'}) 03:36:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x37}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:05 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 795.642682] input: syz1 as /devices/virtual/input/input1622 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xeffdffff00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x100000001) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x202, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffd0, 0x0, @time={0x0, 0x1c9c380}, {}, {}, @raw8={"e250795213d2ea4c2266b9bd"}}], 0x30) [ 795.706588] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 795.719295] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.726787] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.731624] FAT-fs (loop4): Filesystem has been set read-only [ 795.757541] input: syz1 as /devices/virtual/input/input1623 [ 795.772506] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 795.780169] device bridge0 left promiscuous mode [ 795.811139] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 795.822173] XFS (loop0): Invalid superblock magic number [ 795.831608] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) 03:36:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xfffffdfd}, 'syz1\x00'}) [ 795.872856] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 795.910979] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 795.921638] input: syz1 as /devices/virtual/input/input1624 03:36:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000300)=0x1, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xff030000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 795.989410] input: syz1 as /devices/virtual/input/input1625 [ 796.027545] IPVS: ftp: loaded support on port[0] = 21 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x37000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x34d4000000000000}, 'syz1\x00'}) [ 796.175368] input: syz1 as /devices/virtual/input/input1626 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xff03}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 796.236393] input: syz1 as /devices/virtual/input/input1627 [ 796.470580] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.477022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.483673] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.490263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.496991] device bridge0 entered promiscuous mode [ 796.502391] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x53d4000000000000}, 'syz1\x00'}) 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0efff7f00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:06 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:06 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 796.528530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 796.566370] input: syz1 as /devices/virtual/input/input1628 03:36:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x3f00000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 796.600003] input: syz1 as /devices/virtual/input/input1629 [ 796.626541] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.633044] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.641068] device bridge0 left promiscuous mode [ 796.804566] XFS (loop0): Invalid superblock magic number [ 796.947813] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.954270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.960939] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.967337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.974143] device bridge0 entered promiscuous mode [ 797.125369] device bridge_slave_1 left promiscuous mode [ 797.131082] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.175059] device bridge_slave_0 left promiscuous mode [ 797.180496] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.237116] team0 (unregistering): Port device team_slave_1 removed [ 797.246017] team0 (unregistering): Port device team_slave_0 removed [ 797.254354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 797.287415] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 797.335407] bond0 (unregistering): Released all slaves [ 797.651785] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.658400] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.666002] device bridge_slave_0 entered promiscuous mode [ 797.702398] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.708890] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.717039] device bridge_slave_1 entered promiscuous mode [ 797.752402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 797.788814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 797.897918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 797.925372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 798.042869] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 798.050076] team0: Port device team_slave_0 added [ 798.086424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 798.093632] team0: Port device team_slave_1 added [ 798.116372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 798.140849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 798.165714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 798.191526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 798.394806] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.401187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.407832] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.414221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.129633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 799.200431] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 799.271046] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 799.277791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 799.285275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 799.354771] 8021q: adding VLAN 0 to HW filter on device team0 03:36:10 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3ed40000}, 'syz1\x00'}) 03:36:10 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000001980)={0x0, &(0x7f0000000580)}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r1) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x1, [0x0]}, &(0x7f0000000540)=0x8) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$binfmt_aout(r3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1c5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) r5 = socket(0x15, 0x0, 0x0) r6 = getpgrp(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x8, &(0x7f0000000680)={0x3b, 0xe9d2, 0x8, 0x10000}) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') tee(r0, r2, 0x100000001, 0x4) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000300)=0x1, 0x4) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xc0820000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="000125bd7000fcdbdf25020000001c0002000800050001010000080002004e240000080004008baf00000800"], 0x1}, 0x1, 0x0, 0x0, 0x41}, 0x80) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000640)={0x0, 0x200, 0x1, 0x5, r4}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}], 0x2c) 03:36:10 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xc000002000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 799.799867] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.806476] bridge0: port 1(bridge_slave_0) entered disabled state [ 799.807040] input: syz1 as /devices/virtual/input/input1630 [ 799.828093] device bridge0 left promiscuous mode 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xffffff7f00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 799.894420] XFS (loop0): Invalid superblock magic number [ 799.905925] input: syz1 as /devices/virtual/input/input1631 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x200000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd458}, 'syz1\x00'}) 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x20007b00}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 800.121297] input: syz1 as /devices/virtual/input/input1632 [ 800.132292] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 800.154552] FAT-fs (loop4): Filesystem has been set read-only [ 800.169421] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 800.209621] input: syz1 as /devices/virtual/input/input1633 [ 800.216169] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 800.223112] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.226515] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c8) [ 800.229725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 800.243488] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.249908] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:10 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"627269646765300000010000feffffff"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000280)=@req={0x28, &(0x7f0000000240)={'ip_vti0\x00', @ifru_settings={0x5ed4, 0x0, @raw_hdlc=&(0x7f0000000200)={0x0, 0x7fffffff}}}}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) 03:36:10 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 800.259550] device bridge0 entered promiscuous mode [ 800.274711] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:10 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7fffedc7}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:10 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd441}, 'syz1\x00'}) [ 800.409727] bridge0: port 2(bridge_slave_1) entered disabled state [ 800.417442] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x8dffffff}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 800.450165] input: syz1 as /devices/virtual/input/input1634 [ 800.467410] input: syz1 as /devices/virtual/input/input1635 [ 800.480541] device bridge0 left promiscuous mode [ 800.541231] XFS (loop0): Invalid superblock magic number 03:36:10 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd451}, 'syz1\x00'}) 03:36:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0ffffff}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 800.643115] IPVS: ftp: loaded support on port[0] = 21 [ 800.670214] input: syz1 as /devices/virtual/input/input1636 03:36:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x2000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 800.735688] input: syz1 as /devices/virtual/input/input1637 03:36:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3dd40000}, 'syz1\x00'}) 03:36:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 800.871783] input: syz1 as /devices/virtual/input/input1638 [ 800.893634] input: syz1 as /devices/virtual/input/input1639 [ 801.260266] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.266736] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.273130] device bridge0 left promiscuous mode [ 801.326840] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.333227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.339911] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.346275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.352854] device bridge0 entered promiscuous mode [ 801.359028] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.365445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.372046] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.378456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.385379] device bridge0 entered promiscuous mode [ 801.390761] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 801.400111] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.406587] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.413120] device bridge0 left promiscuous mode 03:36:11 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0ff7f}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 801.517144] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.523858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.532967] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.540637] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.547542] device bridge0 entered promiscuous mode [ 801.553421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 801.590468] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.596981] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.607107] device bridge0 left promiscuous mode [ 801.756766] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.763171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.769871] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.776273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.783556] device bridge0 entered promiscuous mode [ 802.084774] device bridge_slave_1 left promiscuous mode [ 802.090314] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.144837] device bridge_slave_0 left promiscuous mode [ 802.152103] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.217128] team0 (unregistering): Port device team_slave_1 removed [ 802.226336] team0 (unregistering): Port device team_slave_0 removed [ 802.234930] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 802.287125] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 802.354419] bond0 (unregistering): Released all slaves [ 802.467213] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.473604] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.480521] device bridge_slave_0 entered promiscuous mode [ 802.503319] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.509989] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.517836] device bridge_slave_1 entered promiscuous mode [ 802.552421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 802.588336] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 802.696824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 802.736637] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 802.902647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 802.909838] team0: Port device team_slave_0 added [ 802.932627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 802.939857] team0: Port device team_slave_1 added [ 802.961661] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 802.994543] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 803.026534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 803.033576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 803.043137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 803.062467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 803.069804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.078549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 803.294427] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.300788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.307516] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.313856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.321308] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 803.634336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 804.052223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 804.122500] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 804.193234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 804.199403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 804.207033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 804.272541] 8021q: adding VLAN 0 to HW filter on device team0 03:36:15 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x0, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xe4ffffff}, 'syz1\x00'}) 03:36:15 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:15 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xffffff8d}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x9, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, &(0x7f0000000540)=""/4096, 0x1000) [ 804.711801] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.718970] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.725345] input: syz1 as /devices/virtual/input/input1640 03:36:15 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./control\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x9}) chmod(&(0x7f0000000080)='./control\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) 03:36:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xfffffff0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 804.759404] input: syz1 as /devices/virtual/input/input1641 [ 804.767967] device bridge0 left promiscuous mode 03:36:15 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000280)={0x0, {}, {{0x2, 0x4e21}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) geteuid() fcntl$getown(r0, 0x9) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000ac0)={0x1, 0x2, 0x100000, 0x2000, &(0x7f0000263000/0x2000)=nil}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b40)) sendmsg$nfc_llcp(r2, &(0x7f0000000a80)={&(0x7f0000000580)={0x27, 0x1, 0x2, 0x0, 0x7, 0x0, "592f17dd69db26b4cefec3a0567d8c65547042443f4b3c8ce65b59f86afd0a67c803762f82beba0593d03dcf4e461e01e69053a45f9af3189139e90ee31821", 0x9}, 0x60, &(0x7f0000000900), 0x0, &(0x7f0000001040)=ANY=[]}, 0x4) getuid() lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000980)={'\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}}) fstat(r0, &(0x7f0000000600)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000}, 0xc, &(0x7f0000000ac0), 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4, 0x20004080}, 0x10) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000400)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000200670f011c240f20c0663520000d000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000000)) 03:36:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x200000000000000}, 'syz1\x00'}) 03:36:15 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x0, @local}], 0x20) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xff00], [], @dev={0xac, 0x14, 0x14, 0xc8a4}}}, 0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x10}) 03:36:15 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./control\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x9}) chmod(&(0x7f0000000080)='./control\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) [ 804.921578] XFS (loop0): Invalid superblock magic number [ 804.961193] input: syz1 as /devices/virtual/input/input1642 03:36:15 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./control\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x9}) chmod(&(0x7f0000000080)='./control\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) [ 805.001848] input: syz1 as /devices/virtual/input/input1643 03:36:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0ff7f00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 805.337732] XFS (loop0): Invalid superblock magic number 03:36:15 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs`', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)) fchdir(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702f00797a3000bbd3c2830f2a102ed2060bdc00ca0afc0a0ab40400005d8ea974c281f5f1a6d118bc38d1a31d6c7a9ac86f072682cf09de0cb8bef55a1a530a3d2cee9ed82516a500ca71b2d0426b9ecd1e2567f55fc232021cccb1dc618056acf431027a552b2b37cf5317c9194789fbfbfec9159de60772992222334c67e84ec1", 0x1ff) 03:36:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2fd4000000000000}, 'syz1\x00'}) 03:36:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x4000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:15 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:15 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./control\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x9}) chmod(&(0x7f0000000080)='./control\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) 03:36:15 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:15 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 805.449717] input: syz1 as /devices/virtual/input/input1644 [ 805.487142] input: syz1 as /devices/virtual/input/input1645 03:36:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xeffdffff}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x1f00000000000000}, 'syz1\x00'}) [ 805.577377] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.584827] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.638652] device bridge0 left promiscuous mode [ 805.659366] IPVS: ftp: loaded support on port[0] = 21 03:36:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x4}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 805.680344] input: syz1 as /devices/virtual/input/input1646 03:36:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x40000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 805.728996] input: syz1 as /devices/virtual/input/input1647 03:36:16 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673fb", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x39d4}, 'syz1\x00'}) 03:36:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xffffff7f}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:16 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:16 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 806.035262] input: syz1 as /devices/virtual/input/input1648 [ 806.088797] input: syz1 as /devices/virtual/input/input1649 [ 806.165765] device bridge_slave_1 left promiscuous mode [ 806.171477] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.225224] device bridge_slave_0 left promiscuous mode [ 806.230791] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.280379] team0 (unregistering): Port device team_slave_1 removed [ 806.288855] team0 (unregistering): Port device team_slave_0 removed [ 806.298247] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 806.356689] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 806.394548] bond0 (unregistering): Released all slaves [ 806.776979] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.783419] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.790998] device bridge_slave_0 entered promiscuous mode [ 806.825511] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.831942] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.839225] device bridge_slave_1 entered promiscuous mode [ 806.875554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 806.910571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 807.011673] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 807.038461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 807.154102] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 807.161257] team0: Port device team_slave_0 added [ 807.196756] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 807.203914] team0: Port device team_slave_1 added [ 807.226294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 807.250172] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 807.274436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 807.299827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 807.500725] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.507110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 807.513669] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.520061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.528200] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 808.235589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 808.306112] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 808.376822] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 808.382944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 808.394062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 808.458920] 8021q: adding VLAN 0 to HW filter on device team0 [ 808.465399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:36:19 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./control\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x2) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x9}) chmod(&(0x7f0000000080)='./control\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0)=0x4, 0x4) 03:36:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xc7edff7f}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"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"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f49fe2f6853a7431dadbb66a0a63e7eb8801772f37289422b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a055821ff1cfce9728d3390897c4ac3febc255154097e94b7c57f47b35c0a67c75f483f29b18da7ffba6b2ebd300007d9ce51b036935c06bc226a5f43f178d94bc71ac1d9d8f13f36547abece6a2f4488e2a36f7408f4342d40bc16c3b8ca586482769077efca569cb10d95e375c02c3f8c5eba43c24e797a5524ab5365578aabcd01e9458583e9b1762560636cef16e0b404e4a0cd5bf3db40b8859ca8fda1a1eb7f11fa9fdd462e3e972620cff883cf382efb89cae7d8cadc3a4ce9d5022e1983c7f1b7f07b49006db10e8f5ed7ada016148904e8"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 03:36:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x600}, 'syz1\x00'}) 03:36:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 808.914316] input: syz1 as /devices/virtual/input/input1650 03:36:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:19 executing program 5: lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f0000000300)='./file0\x00', 0x6, 0x6, &(0x7f0000000540)=[{&(0x7f0000000340)="d31115c275260a1e9cce034a3cbc621cf1101d564e927d942e013b30e5992ad0a859e9239a37c53907919739fa5cf7c7f945be8d5dc3a42cef3d2abea56f86b31b61c39aabc4f26ade07a2a4bd42b8ef210927", 0x53, 0x5}, {&(0x7f00000003c0)="08f43911cd26f68e544fa24b17d5f6edff805759adae93d362e690b8ac0d3ce2e1de663c8329063b3f0a2d9b2162e6dcb8fa", 0x32, 0x5}, {&(0x7f0000000400)="2526e26225cbea323fb2195410519d72a2", 0x11, 0x400}, {&(0x7f0000000440)="9ae049418b4e6272ce6ae175aefd92963242cd3a0fef39b01c35543ebc125cdf634ec916a21f1edc494dc8638f44837d6237cf36e6090887e7d03949b4da10b70aa885e9049756933eb9ce6d5df7ea3325d94ff33bbe496ead263d3156d54923c1536fb21b879820396759a0b0390bdc9ad8e054336b7646fc64c77ff521c8", 0x7f, 0x5}, {&(0x7f00000004c0)="a650374a2c5080ca2a9e99381460b42d411ce3d709", 0x15, 0x2}, {&(0x7f0000000500)="5f4552f1df633ab508e21ddf2d824fc9476330fc4641d21ee896c087f1204b9a19da5000690b208834865f8847f490ccbd85bdd123c6b864ad", 0x39, 0x6}], 0x20000a, &(0x7f00000006c0)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@spectator='spectator'}, {@barrier='barrier'}], [{@audit='audit'}, {@audit='audit'}, {@euid_lt={'euid<', r0}}]}) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) accept4$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0x1c, 0x80800) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=ANY=[]) socketpair(0x5, 0x800, 0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e23}, {0x6, @local}, 0x40, {0x2, 0x4e23, @rand_addr=0x401}, 'irlan0\x00'}) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}, {}], 0x0, [{}]}, 0x88) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) [ 808.962626] input: syz1 as /devices/virtual/input/input1651 03:36:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x3f00}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd44e}, 'syz1\x00'}) [ 809.049798] XFS (loop0): Invalid superblock magic number [ 809.065802] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.072248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 809.078954] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.085404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 809.105594] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(85650841492410) <= P.seqno(0) <= S.SWH(85650841492484)) and (P.ackno exists or LAWL(217396282495079) <= P.ackno(217396282495080) <= S.AWH(217396282495080), sending SYNC... [ 809.137288] input: syz1 as /devices/virtual/input/input1652 [ 809.150007] input: syz1 as /devices/virtual/input/input1653 03:36:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x6) mkdirat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000380)="263e0f232cb9f40a00000f32650f2222b9800000c00f3235000400000f30b9800000c00f3235002000000f30c4e2053c54bba4f32e670f09b95c0300000f3266b8cf008ed8b805000000b97cc9b7940f01c1"}], 0x3c6, 0x0, &(0x7f0000000080), 0x100000c2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 809.203311] device bridge0 entered promiscuous mode 03:36:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7b002000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4ad4000000000000}, 'syz1\x00'}) [ 809.258738] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 809.304912] input: syz1 as /devices/virtual/input/input1654 [ 809.350215] input: syz1 as /devices/virtual/input/input1655 [ 809.367720] dccp_close: ABORT with 1061 bytes unread 03:36:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"edb2d9174f7c6578b7a9205a23cf7474e54912a8d7b9af3bee41b348180ebf7bcbb28ae494e69f9ae0c45249cf05f0c599525352654ac90fadbd3f00ed260c5d42183cd349bb7a668c7900928a3d91cd80cdd8d53cb7d2a8e0cff4a90d0c13106e9cc54f40e7786fe14a1ebf1d48908007f68a001730b943247136da8559fb401fe6e2558e5e55b6f7a717a12d48033ac824404510be641db7d1eb9c7112be210b38b10eb422d0ea7fbec2d49223ffbae407f58bfb930222386bdb77b60736cebafc3d0a17e0475bfb73657d09187971e2d9d1b3375243903c5e7359535ecdb23e5a487352bc39f14edb6eb38d4a9e53df94eb6427e49680be985610bddac80619a490da9579424f4d224c9ffda5923f2347cc58d1befa718842751c81d8c04741721c63bb387ae3649739914bb28bd5afe8228f03263e74d9c099d2f00050b1cd5c2a77cbf260378feb5a61e05b8f9122a6ee6a88cfa9556c5bc06791bced756a39f0e54412000e01e16354f1bbe78dd4d3691c056647138e7be828f0769bcdb248a27570726f3baaedcb57e76a31864fefeb2206a390fbe49e79b929c7ac790fa370e92b78c1f169c8885d07a36562f3bd743c00024a175a9d054a6674a661c9cd259cdb94b849fc1920b13b2eb8a3e34d33a2571d4e7211ccb37f0a3d02b73be169c72b7ca3fecb8d09d2e8e02ce75b8596b4cf832dfff0811e86f385cd68255feffb673db8db3aab647f4fff85771f5836ff03c337e0f5460a9604e598c32343b5690194af720586e63624ca2c4e3911a4d596885f4a933c90576e8eb5b14674577851fc605b8e22b93037ca587c0dd4b5e3c0302cfe5de77a7ced5fe77c44fcbd3de6ee4761ff8cb5e4370531d2bf7ce1c89ff44eee50b4297b63b037b2405eb8fe02a50027d7e0c5b82ee03b3520069a07c039811cf8eaedb87df4c7739e8bc335dd800a1d74e43104f7ba942d47e878aca1fe20a1c15e71966a1ab3d3feb80cb52478712c61795d2293f7f4ae5753cd3ccc94d7dcbb33f3a50a376ed88ac5a3c201add3461a286de0c80d78cadc7c2779868f9a5bd0b6297ae4a601381f0d944bd7a06dacbeb356b1aaf33fb16f1beaea8e6960f14716231a8686cd3f745c624ddf4a1f33545ac414ae7e577b9df5f7edbb4425ebd078df3994f27c6ba98185f791cf79ae2501ef1da10ce2954532d87f5de77d1ef3e533760b00d072209dae4a5d02807921a98778227f9f0ac410548ffce160d0a375a837bcf74c7245dce09d0019d8b3858946752eee86e69b62eebb244119dae871b3b5b87e9208914a7d66fa21711108524bce140c86ea1a8cf64c0487d67678354bc2c0e530fe6737cdbcbfa10d228324b3635251a788a768d4111b6c8bffa74aa24d982fc5a7f7fac93eae3bcf82ca868ada103bbdbec776e8a96592a8b8e593e297a7748787"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 03:36:19 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7ffff000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x88000000}, 'syz1\x00'}) [ 809.448240] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.455695] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"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"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 03:36:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xfffffdef}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 809.511843] device bridge0 left promiscuous mode [ 809.528117] input: syz1 as /devices/virtual/input/input1656 [ 809.539590] XFS (loop0): Invalid superblock magic number [ 809.571056] input: syz1 as /devices/virtual/input/input1657 03:36:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x100000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x45d4}, 'syz1\x00'}) [ 809.719682] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(160928358789683) <= P.seqno(0) <= S.SWH(160928358789757)) and (P.ackno exists or LAWL(13601336784917) <= P.ackno(13601336784918) <= S.AWH(13601336784918), sending SYNC... [ 809.766082] input: syz1 as /devices/virtual/input/input1658 [ 809.816377] input: syz1 as /devices/virtual/input/input1659 03:36:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xff03000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4000}, 'syz1\x00'}) [ 809.903100] IPVS: ftp: loaded support on port[0] = 21 [ 809.914983] dccp_close: ABORT with 1061 bytes unread 03:36:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"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"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) [ 809.961644] input: syz1 as /devices/virtual/input/input1660 [ 810.010541] input: syz1 as /devices/virtual/input/input1661 03:36:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfst', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x3700000000000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 810.086241] bridge0: port 2(bridge_slave_1) entered blocking state [ 810.092679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 810.099379] bridge0: port 1(bridge_slave_0) entered blocking state [ 810.105750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 810.112588] device bridge0 entered promiscuous mode [ 810.118385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:20 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd446}, 'syz1\x00'}) [ 810.195835] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(263947310375064) <= P.seqno(0) <= S.SWH(263947310375138)) and (P.ackno exists or LAWL(193525777660528) <= P.ackno(193525777660529) <= S.AWH(193525777660529), sending SYNC... 03:36:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x3700}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 810.245467] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.251935] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.262318] input: syz1 as /devices/virtual/input/input1662 [ 810.272717] input: syz1 as /devices/virtual/input/input1663 [ 810.285615] device bridge0 left promiscuous mode [ 810.393612] dccp_close: ABORT with 1061 bytes unread [ 810.487986] bridge0: port 2(bridge_slave_1) entered blocking state [ 810.494434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 810.501098] bridge0: port 1(bridge_slave_0) entered blocking state [ 810.507506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 810.514317] device bridge0 entered promiscuous mode [ 810.519956] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 810.744714] device bridge_slave_1 left promiscuous mode [ 810.750259] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.794817] device bridge_slave_0 left promiscuous mode [ 810.800277] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.867251] team0 (unregistering): Port device team_slave_1 removed [ 810.876041] team0 (unregistering): Port device team_slave_0 removed [ 810.884380] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 810.927127] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 810.974793] bond0 (unregistering): Released all slaves [ 811.094582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 811.148714] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.155326] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.162199] device bridge_slave_0 entered promiscuous mode [ 811.195514] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.201946] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.209313] device bridge_slave_1 entered promiscuous mode [ 811.244922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 811.280145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 811.383732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 811.421020] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 811.572185] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 811.579793] team0: Port device team_slave_0 added [ 811.601360] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 811.609310] team0: Port device team_slave_1 added [ 811.645257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 811.669000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 811.692112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 811.717428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 811.935878] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.942249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 811.948904] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.955261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 812.671405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 812.739883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 812.811266] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 812.817503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 812.825309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 812.896323] 8021q: adding VLAN 0 to HW filter on device team0 03:36:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"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"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 03:36:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xffffffe4}, 'syz1\x00'}) 03:36:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x200000c0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000000, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x5) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1b) 03:36:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:23 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0xfffffffffffffee0, 0x0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000440)='syz', 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000800)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, &(0x7f00000005c0)="000000923f20f39a1547f8dafed42e21ace35c50a63231b1356be88bfa26280173f8d41b5417c6d2e8970a8705407fd3e70d5a61394fc5cff9fdf3245ed6a57c0a4e2de7cf7b9b59f02110c06bbcb0005aa41e14665f9553b37b68ae47da68500aac02cc2117df", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000500)) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x408000) read$FUSE(r0, &(0x7f0000003000), 0xffffffffffffff8f) read$FUSE(r0, &(0x7f0000005000), 0xffffffffffffffe8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000003c0), 0x1) read$FUSE(r1, &(0x7f0000008000), 0x1000) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="2000000054baa52c1f1080efae3193667f4260659f4d826a6c119b5d91694e8437eda7681c5cf6dbb8e37a6ef8a701aba3f3a2561bd1de9a7aa50b0000f382abd9b0000c6574e1ece16d51037223cc7af61319073a4e7eb34d76aec243cb99da4c6dccc4e0c8e5f716455310dfda2ad2b96880a847d2696ffa0517b7bd749862dc0116a970ed11c106136cba1c594f1c09e9b7fd00507fbbb076586063fff1a4fe526e64f44aa05a05ac57e1c55a3e74", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2501000000080003008700000004000500"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x80) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r1, &(0x7f0000000640)={0xca, 0x0, 0x3}, 0x23a) ioctl(r3, 0xffffffffffffffff, &(0x7f0000000b40)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0\x00', r1}, 0x10) 03:36:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7fffeff0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 813.331535] input: syz1 as /devices/virtual/input/input1664 [ 813.348750] bridge0: port 2(bridge_slave_1) entered disabled state [ 813.355249] bridge0: port 1(bridge_slave_0) entered disabled state [ 813.374859] device bridge0 left promiscuous mode 03:36:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/51, &(0x7f0000000280)=0x33) fdatasync(0xffffffffffffff9c) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000005c0)={"edb2d9174f7c6578b7a9205a23cf7474e54912a8d7b9af3bee41b348180ebf7bcbb28ae494e69f9ae0c45249cf05f0c599525352654ac90fadbd3f00ed260c5d42183cd349bb7a668c7900928a3d91cd80cdd8d53cb7d2a8e0cff4a90d0c13106e9cc54f40e7786fe14a1ebf1d48908007f68a001730b943247136da8559fb401fe6e2558e5e55b6f7a717a12d48033ac824404510be641db7d1eb9c7112be210b38b10eb422d0ea7fbec2d49223ffbae407f58bfb930222386bdb77b60736cebafc3d0a17e0475bfb73657d09187971e2d9d1b3375243903c5e7359535ecdb23e5a487352bc39f14edb6eb38d4a9e53df94eb6427e49680be985610bddac80619a490da9579424f4d224c9ffda5923f2347cc58d1befa718842751c81d8c04741721c63bb387ae3649739914bb28bd5afe8228f03263e74d9c099d2f00050b1cd5c2a77cbf260378feb5a61e05b8f9122a6ee6a88cfa9556c5bc06791bced756a39f0e54412000e01e16354f1bbe78dd4d3691c056647138e7be828f0769bcdb248a27570726f3baaedcb57e76a31864fefeb2206a390fbe49e79b929c7ac790fa370e92b78c1f169c8885d07a36562f3bd743c00024a175a9d054a6674a661c9cd259cdb94b849fc1920b13b2eb8a3e34d33a2571d4e7211ccb37f0a3d02b73be169c72b7ca3fecb8d09d2e8e02ce75b8596b4cf832dfff0811e86f385cd68255feffb673db8db3aab647f4fff85771f5836ff03c337e0f5460a9604e598c32343b5690194af720586e63624ca2c4e3911a4d596885f4a933c90576e8eb5b14674577851fc605b8e22b93037ca587c0dd4b5e3c0302cfe5de77a7ced5fe77c44fcbd3de6ee4761ff8cb5e4370531d2bf7ce1c89ff44eee50b4297b63b037b2405eb8fe02a50027d7e0c5b82ee03b3520069a07c039811cf8eaedb87df4c7739e8bc335dd800a1d74e43104f7ba942d47e878aca1fe20a1c15e71966a1ab3d3feb80cb52478712c61795d2293f7f4ae5753cd3ccc94d7dcbb33f3a50a376ed88ac5a3c201add3461a286de0c80d78cadc7c2779868f9a5bd0b6297ae4a601381f0d944bd7a06dacbeb356b1aaf33fb16f1beaea8e6960f14716231a8686cd3f745c624ddf4a1f33545ac414ae7e577b9df5f7edbb4425ebd078df3994f27c6ba98185f791cf79ae2501ef1da10ce2954532d87f5de77d1ef3e533760b00d072209dae4a5d02807921a98778227f9f0ac410548ffce160d0a375a837bcf74c7245dce09d0019d8b3858946752eee86e69b62eebb244119dae871b3b5b87e9208914a7d66fa21711108524bce140c86ea1a8cf64c0487d67678354bc2c0e530fe6737cdbcbfa10d228324b3635251a788a768d4111b6c8bffa74aa24d982fc5a7f7fac93eae3bcf82ca868ada103bbdbec776e8a96592a8b8e593e297a7748787"}) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f68591512c4636d34e1d3cc668e8b4f8843a8485590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb11d1171be83d26f047ce47c565dbf107ab9605a473e04c7e779a0c244ca4388df158abb"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r4, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000340)=""/247, 0xf7}], 0x1) sendto$inet(r0, &(0x7f0000000a00), 0xff00, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x800) [ 813.413245] input: syz1 as /devices/virtual/input/input1665 03:36:23 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8b01, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x80000000, 0x4, {"86831a4f1ad8d22b6a79225c356258e9"}, 0x200, 0x10001, 0x101}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r3}}, 0x18) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid_for_children\x00') r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r5 = creat(&(0x7f0000000200)='./file1\x00', 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000300)={0x0, 0x80000, r5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000340)={r6, 0x80000, r2}) write$evdev(r5, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r4) 03:36:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x50d4000000000000}, 'syz1\x00'}) [ 813.492371] XFS (loop0): Invalid superblock magic number 03:36:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0ffffff00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000340)=""/247, 0xf7}], 0x1) sendto$inet(r0, &(0x7f0000000a00), 0xff00, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x800) [ 813.628624] input: syz1 as /devices/virtual/input/input1666 [ 813.679599] input: syz1 as /devices/virtual/input/input1667 03:36:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xc7edff7f00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x36d4}, 'syz1\x00'}) [ 813.814555] input: syz1 as /devices/virtual/input/input1668 [ 813.841051] input: syz1 as /devices/virtual/input/input1669 03:36:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:24 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000340)=""/247, 0xf7}], 0x1) sendto$inet(r0, &(0x7f0000000a00), 0xff00, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000000), 0x800) 03:36:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xc0000020}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x42d4}, 'syz1\x00'}) [ 813.934122] bridge0: port 2(bridge_slave_1) entered blocking state [ 813.940574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 813.947252] bridge0: port 1(bridge_slave_0) entered blocking state [ 813.953618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 813.960372] device bridge0 entered promiscuous mode [ 813.966084] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 814.024003] input: syz1 as /devices/virtual/input/input1670 [ 814.055103] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.061600] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x7530}}, &(0x7f0000000100)) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 814.095816] input: syz1 as /devices/virtual/input/input1671 [ 814.119912] device bridge0 left promiscuous mode 03:36:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) uname(&(0x7f00000000c0)=""/88) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r1}) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x40000) 03:36:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0efff7f}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x54d4}, 'syz1\x00'}) [ 814.184734] XFS (loop0): Invalid superblock magic number 03:36:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x2}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 814.265101] input: syz1 as /devices/virtual/input/input1672 [ 814.300405] input: syz1 as /devices/virtual/input/input1673 03:36:24 executing program 4: pipe2(&(0x7f00008df000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v2={0x10c282739c201aea, 0x0, 0x12, 0x7, 0x3c, "a6bed835285433917803c85f3af88f36b12c3e3252e4a6ca25f41bb0d349753bd25b0c77ca34777dfe9c5886366b5e5a01572be81d60807dbe0422a2"}, 0x46, 0x3) write(r1, &(0x7f00004abf1b)="ae", 0x1) vmsplice(r1, &(0x7f00000005c0)=[{&(0x7f0000000540)="17", 0x1}], 0x1, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x10}, 0x10) readv(r0, &(0x7f0000c9e000)=[{&(0x7f0000c25f19)=""/231, 0xe7}], 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r2, 0x2c, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3500}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40010) 03:36:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x39d4000000000000}, 'syz1\x00'}) [ 814.418545] IPVS: ftp: loaded support on port[0] = 21 [ 814.470903] input: syz1 as /devices/virtual/input/input1674 [ 814.516201] input: syz1 as /devices/virtual/input/input1675 [ 814.588856] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.595300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 814.601974] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.608361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 814.617802] device bridge0 entered promiscuous mode [ 814.623546] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x8dffffff00000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:24 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x42, &(0x7f0000000440)=[{&(0x7f0000000600)="ba61322c2ff1b630a1d8c4afaa41c44044ac2ba3d0d32793e0ee31e13bb3697dd34b323c14c6152f5a8daf014cd01ad82dea632bbb3d80fd6caac0d0b9ac98fd70eec313e668cab68e4100ef7e8ce6a416ee5d195bfaa5709e674be2d4", 0x5d}, {&(0x7f00000001c0)="0f70a1134b1b075bec060ef08a451d121b19fe162c32c0fc3e00e4c9cec7052632eae1cfb15e24afee5a850282bd351db575c3bb4184f9f8d7cdfb2772fecb236808bae993fa458858ffefeb401360e06ea338bc96e5328db1e333f6d5439ca3aca7c554167912441e6a85ccb5df2fa8b3618d311e00054eeeec58e4d3dae6527778c0837d599e5276c2c9da56b32f62bb2bf5894bd7726c19dd0ef7f372eed4df4411b2fd250ea0f640c4745a8da30f1b031d94d81f6c9964235b4ac7bbf7b4323c3ecc812b03bf3dd5b41536e6938e860159a4181e4d", 0xd7, 0xa1b1}, {&(0x7f0000000540)="89738c9dab0b44771977c5300d186c85a153f595ea9611ca2e3cb5e8e096c54801ad9a8c205271a15382788f1e800bd1792a50299b5d7fb119f0e1938c854e8af29f304c13de06f5c0addf87c1ae188ebe7eac64e65e5c3b11b57469da416a1677a6cf35b2111e269f0a156693ceccb95ff07cb598cde3fb1386123cea26cda5f53faad9bbb2c934df928c01706fcdbde48b16e966561fb0003040cd8138b05249c20d0dee1b4d150ed7", 0xaa, 0x5}, {&(0x7f0000000500)="c82407602fdd6cb83ddf3175", 0xc, 0xeba5}, {&(0x7f00000003c0)="6f86fbbcd228cd6e7bc2de3b5860849d0bea69753d7758903ef0f0e49736cddca159e620422e1f91974023ad13211fbe5272195989b2a5401b84103178922907f76b6908e3a2810b4707f9824f", 0x4d, 0x80000000}], 0x1111004, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, '):cgroup'}}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) 03:36:24 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4000000000000}, 'syz1\x00'}) 03:36:24 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0xf0ffffff7f0000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 814.730294] input: syz1 as /devices/virtual/input/input1676 [ 814.742415] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.749756] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.803388] device bridge0 left promiscuous mode [ 814.819989] input: syz1 as /devices/virtual/input/input1677 [ 814.907291] XFS (loop0): Invalid superblock magic number [ 815.057934] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.064419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.071101] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.077517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 815.084342] device bridge0 entered promiscuous mode [ 815.089874] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 815.097072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 815.295006] device bridge_slave_1 left promiscuous mode [ 815.300527] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.344806] device bridge_slave_0 left promiscuous mode [ 815.350239] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.407041] team0 (unregistering): Port device team_slave_1 removed [ 815.416456] team0 (unregistering): Port device team_slave_0 removed [ 815.425201] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 815.447364] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 815.494551] bond0 (unregistering): Released all slaves [ 815.675736] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.682133] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.689354] device bridge_slave_0 entered promiscuous mode [ 815.726606] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.733090] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.740876] device bridge_slave_1 entered promiscuous mode [ 815.776120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 815.812532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 815.918592] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 815.956731] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 816.110589] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 816.117863] team0: Port device team_slave_0 added [ 816.139890] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 816.147183] team0: Port device team_slave_1 added [ 816.171334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 816.178246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 816.193767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 816.217099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 816.223919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 816.232809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 816.252202] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 816.259396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.268393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 816.296054] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 816.303191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 816.312227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 816.514255] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.520634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 816.527274] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.533618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.541032] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 817.174281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 817.263576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 817.335220] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 817.404452] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 817.410579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 817.418626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.487136] 8021q: adding VLAN 0 to HW filter on device team0 03:36:28 executing program 5: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) socket$inet6(0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000340)={0xff, 0x10001, 0x800, 'queue1\x00', 0xa9f}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 03:36:28 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r1 = geteuid() ioprio_set$uid(0x3, r1, 0x5) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000c5e9493c80d6c16a3400000000c36a90b8aecd58f9514012f420f06efe817ab1be7ef44345ca97607ed092c2913cf17f76cb0a69c0ca981df1d8e6c258f0"], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000240)=0x4) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x2d6) 03:36:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x7b0020}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xa000000}, 'syz1\x00'}) 03:36:28 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000240)) 03:36:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28}, 0x30) [ 817.931886] input: syz1 as /devices/virtual/input/input1678 [ 817.938596] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.945070] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.964692] device bridge0 left promiscuous mode 03:36:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) [ 818.002360] input: syz1 as /devices/virtual/input/input1679 [ 818.008771] XFS (loop0): Invalid superblock magic number 03:36:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x3f000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:28 executing program 4: syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) tkill(r0, 0x11) 03:36:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4bd40000}, 'syz1\x00'}) 03:36:28 executing program 4: syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) tkill(r0, 0x11) 03:36:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000580), 0x20) ioctl$SG_GET_NUM_WAITING(r0, 0x227c, &(0x7f00000007c0)) [ 818.204922] input: syz1 as /devices/virtual/input/input1680 03:36:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x0) clone(0x53800203, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) [ 818.284364] input: syz1 as /devices/virtual/input/input1681 03:36:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x32d40000}, 'syz1\x00'}) [ 818.490222] input: syz1 as /devices/virtual/input/input1682 [ 818.530003] input: syz1 as /devices/virtual/input/input1683 03:36:29 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000240)) 03:36:29 executing program 5: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), 0x4) r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') shutdown(r0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd44b}, 'syz1\x00'}) 03:36:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 818.634896] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.641377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.648091] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.654456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.661123] device bridge0 entered promiscuous mode 03:36:29 executing program 5: [ 818.721554] input: syz1 as /devices/virtual/input/input1684 [ 818.755163] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.762318] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 818.781886] input: syz1 as /devices/virtual/input/input1685 [ 818.827280] device bridge0 left promiscuous mode [ 818.848606] XFS (loop0): Invalid superblock magic number [ 818.936196] XFS (loop0): Invalid superblock magic number 03:36:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000003c0)={0x18}, 0x18) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x7, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0xf062400000000000, &(0x7f0000000000), 0x0) 03:36:29 executing program 5: 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x8}, 'syz1\x00'}) [ 819.063552] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.070013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 819.076697] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.083038] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:29 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 819.119425] input: syz1 as /devices/virtual/input/input1686 [ 819.156329] input: syz1 as /devices/virtual/input/input1687 [ 819.203969] device bridge0 entered promiscuous mode 03:36:29 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000240)) 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:29 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xe66}}, [0x2, 0x7fffffff, 0x2, 0xfffffffffffffbff, 0x2023, 0x80000001, 0xff, 0x3ff, 0x9, 0xfffffffffffffff7, 0x6, 0x0, 0x1, 0x3, 0x400]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000380)={r2, 0xf4, "9ef39856c99b844dec1481be5df987a5cb6e9097d0c1a2b7d1607ccc17420922659cd5e1836416f46c034e4686ce76fb62bd3fa2c67f3640af4b0b152591b4aae1026147eb43b2912e28fd2ac6854c49b21e28149337a3ef6fc431861edfeb095ed98d851506de06be451e33fecb03d767cb2d5096f214393e321c690adfe3b7a00a999a1756871ce4751b50c4fd4bde1dbf0a7b363d5e6168ae60cf27d2a5cd0461eba6e3b7ab956eed208e479a9d8adfb683477538441de5a10d36548df9a1a71ea1975bc18ad36763785bf435761ab7674b2e26082aab910bc20f78cb1a4ed2cada62afe69b3697780eb36a2e00a13630a736"}, &(0x7f00000001c0)=0xfc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000300)={@loopback, @empty, @loopback, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, r3}) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:36:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xffffff7f00000000}, 'syz1\x00'}) 03:36:29 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0xfffffffffffffffd}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 819.347835] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.354375] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.384793] device bridge0 left promiscuous mode 03:36:29 executing program 4: 03:36:29 executing program 4: [ 819.431625] input: syz1 as /devices/virtual/input/input1688 [ 819.455622] XFS (loop0): Invalid superblock magic number 03:36:29 executing program 5: [ 819.496469] input: syz1 as /devices/virtual/input/input1689 03:36:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:29 executing program 4: 03:36:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x42d40000}, 'syz1\x00'}) 03:36:30 executing program 5: 03:36:30 executing program 4: 03:36:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 819.821299] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.827755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 819.834459] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.840811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 819.847557] device bridge0 entered promiscuous mode 03:36:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:30 executing program 4: [ 819.882629] input: syz1 as /devices/virtual/input/input1690 03:36:30 executing program 5: 03:36:30 executing program 1: [ 819.928489] input: syz1 as /devices/virtual/input/input1691 03:36:30 executing program 1: 03:36:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:30 executing program 4: 03:36:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x45d40000}, 'syz1\x00'}) [ 820.031210] XFS (loop0): Invalid superblock magic number 03:36:30 executing program 1: 03:36:30 executing program 4: [ 820.116710] input: syz1 as /devices/virtual/input/input1692 03:36:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:30 executing program 1: 03:36:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 820.167902] input: syz1 as /devices/virtual/input/input1693 03:36:30 executing program 4: 03:36:30 executing program 5: 03:36:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:30 executing program 1: 03:36:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x40d4}, 'syz1\x00'}) 03:36:30 executing program 4: 03:36:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x20) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'veth1_to_team\x00', 0x4}, 0x3d2) socket$inet6(0xa, 0x1, 0x20) ioctl(r1, 0x8916, &(0x7f0000000000)) write(r0, &(0x7f00000000c0)="9df53c99d896a87a4f444ddb265b035c114bc4c11135292ae7a500b33413673791973ba40418b486eb443f5cbd3207a222e3e14be6c8fa7e743aed8d6983641bc5dc8a3261eac37d6dfea573e2c280834f763f9f417567b5d549de0c95e1542f90c733c1a98eb1db54ab49c8d3ef26d4c100ac5ee8cf46054790e2f66fc102b9a18b76ad40d8d86a132277e367f0d340d4ccba09927aac3e666f8c2adb9a4162488df77ee4140e0699d446fb02700833e2353cbbd04ce471fe8b4b39acaca28c19b246c663", 0xc5) ioctl(r1, 0x8936, &(0x7f0000000040)="e696775ed49b67c0629eec66b31813a8a167c3a783f2f037705d5a1875c998b15b3786355c4f5749904b7e338beca8bb34cc12549fec60e897bb548e9b4ea78c0198ffe735e46e6f0be705") 03:36:30 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000080)) [ 820.426581] input: syz1 as /devices/virtual/input/input1694 [ 820.459312] XFS (loop0): Invalid superblock magic number [ 820.482940] input: syz1 as /devices/virtual/input/input1695 03:36:30 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2e797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) 03:36:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd450}, 'syz1\x00'}) 03:36:31 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2f797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) [ 820.696931] input: syz1 as /devices/virtual/input/input1696 [ 820.734595] device bridge_slave_1 left promiscuous mode [ 820.740374] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.752105] input: syz1 as /devices/virtual/input/input1697 [ 820.787353] IPVS: ftp: loaded support on port[0] = 21 [ 820.825083] device bridge_slave_0 left promiscuous mode [ 820.830643] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.929046] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 820.946947] team0 (unregistering): Port device team_slave_1 removed [ 820.952245] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 820.966178] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 820.976064] team0 (unregistering): Port device team_slave_0 removed [ 820.994800] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 820.999037] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 821.010472] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 821.023349] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 821.037807] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 821.059233] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 821.069418] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 821.082806] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 821.113358] bond0 (unregistering): Released all slaves [ 821.201020] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 821.723598] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.730286] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.738042] device bridge_slave_0 entered promiscuous mode [ 821.775420] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.781849] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.789168] device bridge_slave_1 entered promiscuous mode [ 821.812016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 821.849108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 821.914902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 821.939494] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 822.033320] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 822.040606] team0: Port device team_slave_0 added [ 822.062008] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 822.069202] team0: Port device team_slave_1 added [ 822.090970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 822.114617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 822.138459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 822.162506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 822.359373] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.365753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.372304] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.378693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.386642] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 823.099384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.171007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 823.184914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 823.250945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 823.257331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.264394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.333292] 8021q: adding VLAN 0 to HW filter on device team0 03:36:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000300)={0x2, 0x0, @rand_addr=0xfffffffffffffffb}, 0x10) 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd42f}, 'syz1\x00'}) 03:36:34 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2f797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) 03:36:34 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:34 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2e797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) [ 823.777797] input: syz1 as /devices/virtual/input/input1698 [ 823.838313] input: syz1 as /devices/virtual/input/input1699 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x33d4000000000000}, 'syz1\x00'}) 03:36:34 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:34 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2f797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) 03:36:34 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 824.039774] input: syz1 as /devices/virtual/input/input1700 03:36:34 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2e797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 824.100626] input: syz1 as /devices/virtual/input/input1701 03:36:34 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 824.203977] XFS (loop0): Invalid superblock magic number 03:36:34 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x7a000000}, 'syz1\x00'}) 03:36:34 executing program 4 (fault-call:7 fault-nth:0): add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:34 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) fcntl$getown(r0, 0x9) prctl$setptracer(0x59616d61, r1) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000400)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x60) r2 = open(&(0x7f0000000140)='./bus\x00', 0x44002, 0x0) sendfile(r2, r2, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) 03:36:34 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 824.350604] input: syz1 as /devices/virtual/input/input1702 03:36:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='timers\x00') dup2(r0, r1) [ 824.439754] input: syz1 as /devices/virtual/input/input1703 [ 824.481222] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.487891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.496092] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.502881] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 824.531061] device bridge0 entered promiscuous mode [ 824.539938] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:36:34 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x22002800fd) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = fcntl$getown(r0, 0x9) set_mempolicy(0x3, &(0x7f0000000480)=0x53, 0xa1) capset(&(0x7f0000000340)={0x399f1736, r2}, &(0x7f0000000440)={0x400, 0x4, 0x3ff, 0x3, 0x101, 0x8001}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x80000) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sched_getparam(0x0, &(0x7f00000000c0)) ftruncate(r0, 0x9c) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r5 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fcntl$setown(r1, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f2e797a30ff", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r5, 0x7005) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$void(r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000080)="c3c1af1be6e9c32f9adf35805471ee98e86170ef569e6f4bb1bbe52cd269d8171a94a9eb", &(0x7f0000000200)=""/171}, 0x18) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000b80)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="84b8251495eb49b5fba98f5bbde542514575076c7cf15d19956c9baac22eefd2de1c4ddc2fb0ce94f1aaa29942fadb57c5d857e3fe5b0ee457633bff102625", 0x3f, 0x69}], 0x80, &(0x7f0000000c00)=ANY=[]) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000940)=""/162) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xffffffff7fffffff, @dev={0xfe, 0x80, [], 0x16}, 0x800}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x2) 03:36:34 executing program 5: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x803) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000240)=""/216) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x4) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={0x0, 0x80, 0x1200000}, &(0x7f0000000800)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000900)={&(0x7f0000000040)=@in={0x2, 0x4e22}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000180)="2f0f3a8c7e275c40be1fd7bd98f06c9522eebcf48b4d4031", 0x18}, {&(0x7f00000004c0)="1ec7bb2e9163b5eab452bc77adc102999629c454d2d4f5f3b8fadb2d5777b2ce4821859d438ed63006a83e113885b4e745c1a3208f2e370918d3ca44f882a19c3a291d7ef3b2114d72ed6a59f894c77b2904f759fef3303b91eefaa64219e5be76d5f31586e1662d21ac5b7edbd83eb9469d2d58ac67960da010a3467bcd21fcd8c9683da020268f62c03ca5f7193193ddb431e3d865b80c5298b4c332506a0136e441", 0xa3}, {&(0x7f0000000580)="a1ce3a8993260fd6204671de46e71f10b151bb2df7f58a54abe62b741b93d355a1b090357346d9fabdcf66aa70384be650b7029c34b11c73d4548c415a5a94ad78535ada286f67b6eed4a2b14e88956618e12bfa0971788431e24b583ac1c625e80c55772e3a98f73923ee4daf2613e64df87a7e7fbf2cd2ab772397cf5cdfa5b405fc652c2a1e43e2e056a41ccd16be936337174fe356c041e2cc91cf9188eb997c62c839439edfcf4591b156d21c0b42a78de891a1aaa1d510995ce1f3e2", 0xbf}, {&(0x7f0000000200)="81be7a115274fa2c9fe3aeae66a41179941454b2572d743c86d3c7dd4bdc275e0c3ab6aaa60a22d510c6e16d9b8c83ac449416ca635e3df3b01109", 0x3b}, {&(0x7f0000000640)="77730905e31a73357f4a9b2019de7746a1c027f0646ed89ed084d67cdf673b4297b7ccec5bfcb1d6b12cb4ec9f8730401c3ca0440178a489543830c1d28249b7630154dfe2f85ba29ccd46c1e1c7218db088449f90eb3528a4b1ca70f98c0f7da8237ceb210533e881b94c102b25be703579538c930a3b517269a9545e6e9b782f65bdf1c8e522264987cb10d32afd4d977444876127c1725f48551fd334fc25f920e25e748fa17598ff7bbdfd65b477a78d07af096a7a7d83ee0d4de0e835d2f5f6f9495f3f62ad", 0xc8}], 0x5, &(0x7f0000000840)=[@dstaddrv6={0x20, 0x84, 0x8, @local}, @init={0x18, 0x84, 0x0, {0x2798, 0x3, 0x3, 0x100000001}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x1, 0xea, 0x7f, r4}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x13}}], 0x88, 0x1}, 0x20000000) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000), 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0xf774}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000380)={r5, 0xff, 0x2, 0x101, 0x4, 0x78d3750e}, &(0x7f00000003c0)=0x14) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000400)=""/143) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) 03:36:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3cd40000}, 'syz1\x00'}) [ 824.608423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:36:34 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:35 executing program 5: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="700000008263603940b78762c1556f158f1157397ca59290a8b36ed9ebb32cc00d958cea7ac23eaed5749ee2c77b6e3f2edace2b28fdfb02914d7ecf60da2258f65efc0000006448e07027c43f965fdceaf891d5428eec62a5aae801c3b599c35141ad83ff0100008b19994f6762074af1ea6fc77132d41ad1beb2a3fe7b5f20c6aec7d26c04f821d8141a8daa54ec303201f1a2e459f77ad5c8266b68d875a0f14f6cf6c8ddaf4602fa84a8699b1507241aebd0ed14d358e4588471c48a9d83fc0536eaa262b3a1713bbd74f4ce83cb6f7579098c110e245e0309ba90"], &(0x7f0000000080)=0x78) listen(r0, 0x3) r1 = dup3(r0, r0, 0x80000) getsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f00000000c0)=""/29, &(0x7f0000000140)=0x1d) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x6000, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040)=0x1700, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)={0x1, [0x0]}, 0x6) [ 824.650125] input: syz1 as /devices/virtual/input/input1704 [ 824.672569] XFS (loop0): Invalid superblock magic number [ 824.718947] input: syz1 as /devices/virtual/input/input1705 [ 824.778014] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.785534] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xc, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[]}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="8a00000000000000010000000000000100000001000000000000007b000000000000e412000000ecff00000400000000000000e4fffffb0000000000"]) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_SET_XCRS(r3, 0xc028ae92, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000006f) preadv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/155, 0x9b}], 0x1, 0x0) 03:36:35 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 824.822161] device bridge0 left promiscuous mode 03:36:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x50d4}, 'syz1\x00'}) 03:36:35 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x18002) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000680)={{0x1, 0x400}, 'port1\x00', 0x41, 0x0, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000440)={&(0x7f0000000080)=[0x3], 0x1, 0x7, 0x0, 0x80000001, 0x68, 0xe432, {0xb3, 0x6, 0xe5a, 0x55, 0x20, 0x4d, 0x9, 0x62d, 0x1, 0x6, 0x1f, 0x3, 0x1f, 0xffffffffffffffff, "7262b910b2907ab8adfeb06c059035159f73ea4870cb4f0319b44e304b24170c"}}) socketpair$inet6(0x2c, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000340)="747275737465642e6f7665726c61792e72fc9d4e664719012befc708056835942c647220e626f6ea59d3eaa21018097d3e48df48614066acb9eebe54fb5d427d254e71d27d07a90c65864ac1830a4f09a289a70b27e67dd7585bb97bb444e3d7d024967550b53b38bd262f11db9aaf1b3c008fbdeded6a845f2b05094f374f6dc7a98f53a3e5a9cf2f4a464839482d646618bc3e3548e1bfdc2c766f277323a907e8e2e561836a1df4c789f0bf85a2c8e2dac1c005a9e2a8be598072251928b373f63bcfed6e80eb72b64c7a89d5fc", 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000004c0)) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000007c0)=0x9) socket$inet6(0x2, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x2) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) tkill(r2, 0x11) r4 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)) 03:36:35 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil, 0x2000) shmdt(r1) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x4}, 0x90) [ 825.048914] input: syz1 as /devices/virtual/input/input1706 03:36:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 825.136915] input: syz1 as /devices/virtual/input/input1707 [ 825.142889] XFS (loop0): Invalid superblock magic number 03:36:35 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) prctl$intptr(0x2b, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setns(r1, 0x0) 03:36:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4800}, 'syz1\x00'}) [ 825.315073] input: syz1 as /devices/virtual/input/input1708 [ 825.343125] input: syz1 as /devices/virtual/input/input1709 03:36:35 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8925, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:35 executing program 5: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="eb", 0x1}], 0x1, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000480)='W', 0x1}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000980)={&(0x7f0000000380)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f00000005c0)="02", 0x1}], 0x1, &(0x7f0000000840)}, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") splice(r0, 0x0, r2, 0x0, 0xced1, 0x0) 03:36:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd447}, 'syz1\x00'}) [ 825.478878] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.485335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.491946] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.498394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.505089] device bridge0 entered promiscuous mode 03:36:35 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:35 executing program 5: r0 = socket(0x10, 0x2, 0x42) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) clone(0x100000, &(0x7f0000000000)="3b40ae4ea4248c54944c0433e331d11eecfbc65539a290a20e7e7746cda8adcb4ab3c48bddaa", &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)="5e7217e2c58ae598fcc9a38673d7d171687ea5ba857d7dd6a7f6e68b31534c0241af5ed0dff64e7d1aa865dcb2cde93d1a14c11e561a4af182de1eccfbfcced0f1286f58c7f53381f9cb1e5036f2f97f682eb16950c0ce7460c40c909a3c34a3ea89091a8e5d57c426bd5fac04fcabab8f1216de830f2101a9579c011532cbfdf8c2994135ae9660cba1d460742501b1ecc9ae3aef0d7b5b67aed78df19ad0be77fcf0559ec62b3198b771a207d29a0e16a9") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x43, &(0x7f0000000200)=""/19) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0), 0x0) [ 825.581324] input: syz1 as /devices/virtual/input/input1710 03:36:35 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8992, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 825.628072] input: syz1 as /devices/virtual/input/input1711 [ 825.812378] XFS (loop0): Invalid superblock magic number 03:36:36 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000040)={0xaa}, 0x0, 0x2d9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000180)) rt_sigtimedwait(&(0x7f0000000080)={0x3}, &(0x7f00000000c0), &(0x7f0000000100), 0x8) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_delete(0x0) 03:36:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xfdffffff00000000}, 'syz1\x00'}) 03:36:36 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x541b, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:36 executing program 5: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8, 0x44001) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) bind$xdp(r0, &(0x7f0000000340)={0x2c, 0x3, r1, 0x2d, r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='#! ./sile0 ppp0(proc#vboxnet'], 0x1c) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f6669806c652e0ebacd428200e7c1783289f501d43eb9e0ef676ffa6c184e646e2a0dab3a24e8fc5a04ad"], 0x34) 03:36:36 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667305", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 826.013009] input: syz1 as /devices/virtual/input/input1712 03:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:36 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8924, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 826.067188] input: syz1 as /devices/virtual/input/input1713 03:36:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x40000}, 'syz1\x00'}) 03:36:36 executing program 1: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) io_setup(0x0, &(0x7f0000000880)) modify_ldt$write2(0x11, &(0x7f0000000580)={0x3ff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x27, 0x1, 0x8, 0x2, 0x400, 0x511}, 0x10) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000440)={{0x2, 0x6, 0x4, 0xfffffffffffffffa, 'syz0\x00', 0x7}, 0x5, 0x21, 0x5, r4, 0x7, 0x5, 'syz0\x00', &(0x7f00000003c0)=['posix_acl_access\x00', '\'user[\x00', 'ppp1\x00', 'keyring\\%-@&}wlan1\x00', '{\\/,lo!\x00', '#em1nodevvboxnet0\x00', '\x00'], 0x4b, [], [0x4, 0x1000, 0x81, 0x9]}) 03:36:36 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673aa", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:36 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8930, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 826.244912] device bridge_slave_1 left promiscuous mode [ 826.252595] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.263388] IPVS: ftp: loaded support on port[0] = 21 [ 826.283736] input: syz1 as /devices/virtual/input/input1714 [ 826.330541] input: syz1 as /devices/virtual/input/input1715 [ 826.338131] device bridge_slave_0 left promiscuous mode [ 826.343604] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x58d40000}, 'syz1\x00'}) [ 826.471793] team0 (unregistering): Port device team_slave_1 removed [ 826.493385] input: syz1 as /devices/virtual/input/input1716 [ 826.509596] team0 (unregistering): Port device team_slave_0 removed 03:36:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 826.524999] input: syz1 as /devices/virtual/input/input1717 [ 826.541900] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 826.602574] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 826.671064] bond0 (unregistering): Released all slaves [ 827.271770] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.278300] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.285888] device bridge_slave_0 entered promiscuous mode [ 827.321757] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.328393] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.335580] device bridge_slave_1 entered promiscuous mode [ 827.359941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 827.383414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 827.469851] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 827.496949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 827.611678] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 827.618918] team0: Port device team_slave_0 added [ 827.640655] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 827.648028] team0: Port device team_slave_1 added [ 827.669953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 827.694097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 827.717993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 827.741863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 827.748977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 827.760746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 827.953444] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.959838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.966505] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.972840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 827.980226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 828.701625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 828.771780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 828.778379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 828.850428] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 828.857037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 828.863912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 828.936100] 8021q: adding VLAN 0 to HW filter on device team0 03:36:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$alg(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000980)="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", 0x700}], 0x1, &(0x7f0000000440), 0x0, 0x20000000}, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0xfffffe1f) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) fcntl$getown(r1, 0x9) getgid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000300)) fcntl$getownex(r2, 0x10, &(0x7f0000000840)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000022c0)=0xc) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000002300)) fstat(r5, &(0x7f0000002340)) fcntl$getown(r2, 0x9) getgroups(0x3, &(0x7f00000000c0)=[0xee00, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getegid() ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000002500)) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) 03:36:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x1000000}, 'syz1\x00'}) 03:36:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:39 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:39 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8916, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:39 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8924, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 829.370064] input: syz1 as /devices/virtual/input/input1718 03:36:39 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe2(&(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb3c67300a18d79ca) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000dc0)={0x6, 0x90b, 0x100000001}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000008c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x1, 0x7, &(0x7f0000000c80)=[{&(0x7f00000002c0)="1be7c88d2e364692ccca11702091dd8fa04223c844f2fb8901c38814c0c19625b2", 0x21, 0xff}, {&(0x7f0000000940)="1191ecfb64be426d09ff3dc00518429ec389db557833adff9aab81674c8e1e55189312176fd92b8d7b0968a265a0910fc1a74be53b176e28866e5b468d5049c8db6602770e7f01d3bc64a2829ea666d3fc45c9d8b28d3cb4211e437130ad1f00847b182070eeb11aa5484e718403e886906856ecdc26533efa2b7beef1", 0x7d, 0x2}, {&(0x7f00000009c0)="db42380f69b1a83bddfb06528a878656fb6f8f2240e337914c1987af501b787fab0c03686fa72b9bc556665b0eb812774596b3f2790fe9987c8a5ea3499e314f1561163f65d9da17f097cae9259beaff887661725c8e6a54be6f625c66ba2f946f6c2317a217660b141d032860b50d1f2c8544b9328bd53fa79608f076b645c55dc78621bce403d7092178984df331ac895bdbc5185de947e16df45b12bcc7068754276c6445c0d4", 0xa8, 0x9}, {&(0x7f0000000a80)="1304379c751cb237b4e1c94679a5260d3477ee70eb7c4251e7ea36ce134f6a6d0e9467b564fda6ce8d5c5497e79f243da08404688abd94506c46fe99dbabf4d863b75969a44f353ff782daaad66345536a867bc4fea513d7438ba9977e3ade268996bb75480657ad489255a3b6dda23609fa2b3201", 0x75, 0x7}, {&(0x7f0000000b00)="248faaa1df39e3e1566a55b125550c02213734696de328df8553508fbf7de58cad4e7cb84cceaa969ea0299f97a0216b681f10d97aa1ead2c97d62447639323a44ff1cf10f2b", 0x46, 0x6}, {&(0x7f0000000b80)="e6bd6c8ba24bb0fec13c3a91ce302c939955f9af3e1b32a4bbb2e0c2cb6c1c60c97fd4cf12557de88d8223bc20b88ec3c997db753342aa", 0x37, 0x6}, {&(0x7f0000000bc0)="7c07676d7e5a95c1c253a2a479c03e60a4323de28dcf8e66e7a45a2a92c4c314151f34dbb4dfa53c65d2ccd6d4bf643a67d3a59ff35a707a79b6d3310303363ffc9dfa6453b16ebd0c473ce2e6e5aeb7d7a59714e96b7eaf2b8f81f4a34b6d015a6593d57273e53c563509988e31aca9d94ceff829a0fca77ae89636e0531f05e1de243751ca9fa7cb11cdebfd879eb9c635", 0x92, 0x7fff}], 0x4, &(0x7f0000000d40)='user_id') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_read_part_table(0x40, 0x8, &(0x7f0000000800)=[{&(0x7f0000000340)="b160acd363a9d3261542097395abff5b0de08128c225eb9ad3378a8e5a0cd736918eee7d49a076f60b492f9193b38509698b19ab285190910b506ecd5d485b68e4ad29c19a7981e0b9a845c1b7b5e5a43edb5ad328a624105944ecf7a9c1603c86486da19aadffc1b10f68f08a9c78e4afa752e4f0b1a9fa4d47c8184ff803a092fa36376638f6f4d43a4baca5f33ae648a1fe00f1060acfc57e1cbfede700c2a91558515655bc0473b6480709a50bfca7948fab68aaf01f58e3733f123e0c5de7dac88ea2bed20deae573e95fcddd0cf3d1fdaa86fb997b26cae950ee", 0xdd, 0x2}, {&(0x7f0000000440)="c354a0d75fe065ec9c07304336e2d8ee0d47e3033be0225901c29bfcb55df72e05a9f0e9c3069cc832ea72c4605a8bffcdc2b58be330176ab088a8e6abb493ebd46195ba7f7c1afe04e4d2866e45427fd110e9d1746d357b9b6fd3cf862c503c9afb1fb66976952f378f5bd4d22a9ac88d520f34d8d4462358d329be29e71c9eae9afec668d519becaed1b624e94438ca6770453d0aba68410ae4cf082605d1907679d47a298476142d408910ffdce88c1993c510a2134ad9b3fdd02bed438f48dc553eda8d4676c707c4cb6c95e981b256d571d5c6697cdadb235e013c793d1f6661b5c74", 0xe5, 0x65}, {&(0x7f0000002000)="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", 0x1000, 0x1}, {&(0x7f0000000540)="d8f5ddf0779504a4bebbf662f6e80bd3cdc98c313f93635669d379fb8db37a607db5bbcd3cc25fe22c2a5c303c21f1f95b4417eac04cd493c8666c5eb12514d39d14d69a2d68e8d2080f2d805b01adbf5c78f41a6549862dd666a7128d94a4ff1633126df87fb91bb96d305003d488e9c3f32de189ac10dab4f982154813f38954ab94a2060f5b54953ec0030a98845eaca441666d98fc56de37c6eb87f6e3cff54b8a7a092e3fe4ad7ac52bcbe75bb1591a1871c1e7c9e7dfa775c127ba7a35294777", 0xc3, 0x2dc}, {&(0x7f0000000000), 0x0, 0x3f}, {&(0x7f00000006c0)="3b8539d5c9742c6d8b4db22a90ce858bb2be2f988c4aa611e2c4c2d49adccc04f5e5f7e3aa990320e94c9d3067b83ad772734570f8febf807894ad0fb48d94e0a6f839586481cb02fcbb4fd9ddded6705b95a39dff9ba7b519f0670dfbb59b7feeb22d30049c30616e18902b3e35542ca7cfe29fbf8df61d82aa53e90a2068dc1973f83e2a32dbf4bf64aa15533867ba074c18e201ecc8c34a8e362d4c3e64a6e8", 0xa1, 0xff}, {&(0x7f0000000080)="bbe38ba4a97dc9868f060c1c58366229ea6aebdab5f080cb27f8d7ac52db4e08723228d4ceebbcab705c4b96e87bf33490f7a81156a6edddb5eb139a9f9dab6719abc79db700b208f5f837eedf320ff7edfc9f56", 0x54, 0x7da15d5e}, {&(0x7f0000000780)="9f2fc93f86042d9de05a8566ba37d55202e609faba47acbbdc26b15b6be248d261d67fd5e468024eab331a1a7e94348761c4c5bc8930d39e36ea3e8fa1625b670b05b60be574cbe1a3b637df96dc21f5000af6d1daa84f8879ebfaf0a10fb54c14fea0bd5aad63a74ea57c5ef655193baa", 0x71}]) setresuid(0x0, r3, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x4}}, 0x50) [ 829.414835] input: syz1 as /devices/virtual/input/input1719 03:36:39 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8980, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd453}, 'syz1\x00'}) 03:36:39 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0x4}, 0x28, 0x2) r1 = syz_open_dev$dri(&(0x7f0000000440)='/dev/dri/card#\x00', 0x6, 0x8000) r2 = dup3(r1, r0, 0x80000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0x0, 0xffff, 0x7ff, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x100000001, 0x40, 0x100, 0xfffffffffffffffd, 0x9, 0x5, 0x2, 0x7, 0x7fffffff, 0x7ff, 0x20, 0xd9, 0x0, 0x0, 0x80000001, 0x80000000, 0x8, 0xfffffffffffffff8, 0x81, 0x81, 0x5, 0x9, 0x7, 0xa78f, 0x4, 0x5, 0xfffffffffffffffe, 0xffffffffffffff7f, 0x0, 0xecfe, 0x0, @perf_config_ext={0x4, 0x8}, 0x1060, 0x7fffffff, 0x100000000, 0x6, 0x7, 0x4, 0x7fff}, r3, 0x1, r0, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x80000001, 0x3, 0x100, 0x1000}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={r5, 0x2}, &(0x7f0000000380)=0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc0, 0x0) dup3(r4, r1, 0x0) [ 829.524987] XFS (loop0): Invalid superblock magic number [ 829.563990] input: syz1 as /devices/virtual/input/input1720 03:36:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6d656d6f72790100000016000000ea66571d6ef0133000", 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x58, 0x1ff, 0x0, 0x80000001}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80400, 0x0) mmap(&(0x7f0000663000/0x1000)=nil, 0x1000, 0xfffffffffffffffe, 0x11, r0, 0x0) 03:36:39 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5451, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000000000f28682e9a23ae96641a58f8f683450ed4cff0700c66b0000007a359a01000080048609a71c4f4f5cebf1c8be47fd9fd758000000000100000000000000000000"], &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 03:36:39 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 829.642891] input: syz1 as /devices/virtual/input/input1721 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3dd4000000000000}, 'syz1\x00'}) 03:36:40 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x800) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) [ 829.845693] input: syz1 as /devices/virtual/input/input1722 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:40 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673cb", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 829.893896] input: syz1 as /devices/virtual/input/input1723 03:36:40 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8936, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x600000000000000}, 'syz1\x00'}) 03:36:40 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:40 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) move_pages(0x0, 0x1, &(0x7f0000000100)=[&(0x7f000028f000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x28100, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x8, 0x3, 0x40, &(0x7f0000551000/0x2000)=nil, 0x8000}) [ 830.101043] input: syz1 as /devices/virtual/input/input1724 03:36:40 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 830.160285] input: syz1 as /devices/virtual/input/input1725 03:36:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1, 0x0, &(0x7f00000000c0), 0x132d) r5 = memfd_create(&(0x7f0000000080)='/dev/kvm\x00', 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001800)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001940)=0xe8) r11 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000019c0)={0x0, r0, 0x0, 0x9, &(0x7f0000001980)='vboxnet0\x00', 0xffffffffffffffff}, 0x30) fstat(r2, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001b00)=0x0) r16 = geteuid() r17 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001b40)=0x0) r19 = getuid() stat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001c40)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c80)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001d80)=0xe8) stat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f0000002000)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001780)=[{&(0x7f0000000440)={0x1088, 0x32, 0x808, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x8, @fd=r2}, @typed={0x8, 0x26, @fd=r1}, @generic="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", @typed={0x8, 0x5, @ipv4=@rand_addr=0x6}, @typed={0x8, 0x6, @u32=0x8}, @generic="cb4232d71dfa9435ea8f351b54c2b87baccda48a5a28d70a1e4f8ee96dd519d9c70e978539666561d5f9f141cd00690fa318301723031b64d31db33b891b988f46c910f97788c06398227b261dac4e4abc04de37c253"]}, 0x1088}, {&(0x7f0000000380)={0x7c, 0x38, 0x801, 0x70bd26, 0x25dfdbfc, "", [@nested={0x14, 0x84, [@typed={0x8, 0x3e, @fd=r0}, @typed={0x8, 0x5a, @uid=r6}]}, @nested={0x58, 0x96, [@generic="433a9c298b541c1d4f341c77639cf05109e8c5aff23b810e70d69408511ceb6b82a42dd53991b9976eb74df36e7a4bc09c645fd894421df7c427f97cebb3f951ff6f2a42aacac08d69c86a50978215b6df"]}]}, 0x7c}, {&(0x7f0000001600)={0xd8, 0x3e, 0x24, 0x70bd2a, 0x25dfdbfb, "", [@nested={0xc8, 0x70, [@typed={0xc, 0x2d, @u64=0x9c}, @typed={0x8, 0x40, @str='\x00'}, @generic="035c15f32ff1d5e7ae1cac846db8e3df2c35d305fd7a58711e5f9f502a3c216bec05d69c160af9b8845d06852d631d1786d30a343741ace4f7f06086fb5b91f22bc3adfec82a34c2f2c41673cfadf2c3471b744ff43a3dcf698018d315f1af249f199c1015d97ade3064b1e50250b1974544e7f451ece4d9d612a73b9972e324fa5f3ae261d937edd0f8a6d05d7cdb3a89f35bef529bf504f42eb7", @typed={0x8, 0x72, @ipv4=@multicast1}, @typed={0x8, 0x12, @uid=r7}, @typed={0x4, 0xe}]}]}, 0xd8}, {&(0x7f0000001700)={0x78, 0x39, 0x100, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x91, @fd=r3}, @generic="2a264a7f3ffa8275aeb6fd153be6b9975ebcd8c2c0d37c300f8627cad3fca251b5460f9a1394ff91d883c075491b7eee6b551579b547211cbca0c2daa2e19ea6331e6250fd473b246db854f9a87682af9f7a0d6902a761f715433c8e6cb2c928"]}, 0x78}], 0x4, &(0x7f0000001e80)=[@rights={0x30, 0x1, 0x1, [r1, r3, r1, r0, r1, r8, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x20, 0x1, 0x1, [r2, r2, r3, r1]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x28, 0x1, 0x1, [r1, r3, r1, r3, r4]}, @rights={0x30, 0x1, 0x1, [r2, r4, r0, r1, r0, r0, r1, r3]}], 0x148, 0x80}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000300)="36f36567fdb9800000c00f3235000400000f30b80e0000000f23c00f21f835030008000f23f8b9580800000f320f4ae3660f38817600b80c0000000f23d80f21f835400000d00f23f80f01c966baf80cb8dc11ab82ef66bafc0c66edc7442400feffffffc744240200680000c7442406000000000f011424", 0x78}], 0x1, 0x1, &(0x7f0000000200), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:36:40 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8994, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x48d4000000000000}, 'syz1\x00'}) 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 830.355513] device bridge_slave_1 left promiscuous mode [ 830.361108] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.387524] input: syz1 as /devices/virtual/input/input1726 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 830.434753] input: syz1 as /devices/virtual/input/input1727 [ 830.435433] XFS (loop0): Invalid superblock magic number [ 830.446330] device bridge_slave_0 left promiscuous mode [ 830.451809] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.487051] IPVS: ftp: loaded support on port[0] = 21 03:36:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x55d4000000000000}, 'syz1\x00'}) 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 830.569993] team0 (unregistering): Port device team_slave_1 removed [ 830.590851] team0 (unregistering): Port device team_slave_0 removed [ 830.601467] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.608842] input: syz1 as /devices/virtual/input/input1728 03:36:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 830.650756] input: syz1 as /devices/virtual/input/input1729 [ 830.658208] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.714437] bond0 (unregistering): Released all slaves [ 831.337437] bridge0: port 1(bridge_slave_0) entered blocking state [ 831.343839] bridge0: port 1(bridge_slave_0) entered disabled state [ 831.351046] device bridge_slave_0 entered promiscuous mode [ 831.387715] bridge0: port 2(bridge_slave_1) entered blocking state [ 831.394230] bridge0: port 2(bridge_slave_1) entered disabled state [ 831.401117] device bridge_slave_1 entered promiscuous mode [ 831.424594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 831.447514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 831.525877] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 831.551456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 831.647975] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 831.655169] team0: Port device team_slave_0 added [ 831.677333] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 831.684550] team0: Port device team_slave_1 added [ 831.706397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 831.730605] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 831.754467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 831.779858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 831.979196] bridge0: port 2(bridge_slave_1) entered blocking state [ 831.985606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 831.992209] bridge0: port 1(bridge_slave_0) entered blocking state [ 831.998594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.005716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 832.725476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 832.795733] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 832.866060] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 832.872183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 832.879456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 832.934253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 832.958988] 8021q: adding VLAN 0 to HW filter on device team0 03:36:43 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xfffffffd}, 'syz1\x00'}) 03:36:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:43 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5421, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:43 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:43 executing program 1: close(0xffffffffffffffff) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='%\x00', 0x2) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x307, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0x1000, 0x2}, {&(0x7f0000001280)="6ce0133ac6eb268cf3d7957a7a3a8b226f9ed7f9fc88149354f558efd7d5521243aeae02fdaa2ed351fb3de113e14e344e66ee8cbf85774cc8632f4755bb2400681f513dfee04c2002822468d455dfe18f772d411e347dc52623757feac1722b4ad333ad081aafb2d5c96a396f45f32ddd9d291d86d5d50772a0248952d27275738ab652516eb1a04bd548bdcb3299766558e28097223a471d565db21fe458c0fc667fac1c3d92313bfc23234b48edbabe0566fc79fba27247b0c3b1075af06f8537102366f38f4b8e9d70a13eaa449ccdf68a403fc14d0cab36cec7f44b6e97c7c390e0cab2b94da8b91cfe76b31b7cc9de5382bb", 0xf5, 0xdbd9}, {&(0x7f0000001380)="db69b34234be7c01b7b7bc7c43694c9b3ccaba6a7f3295eb4b64ff37aa43ea833a1ec48395eeb3b2cbdd7ff1f20f99f421ffccc953715aa8d17b1dd2f09dd61fe07ef6218850ca023b89e9789fc9457fec7646e42e856193bfe756bbf56d46ea946b1122e0a9356898dddbfc4e9516051dcb73eb2f6cf9a5a465a14b823bb8daee56b0dd1c9d2dff659f005486acd3e1c2f0c7b82b9f1915c030e42de7c1050bcbd5985d5051e903f81c7a48bcdfac4fcb889eb8f3d03caa338f85312d3c66d26548c306f2c301d211ee0e4cac41843121fdecacd7dbff4d1ad3b7ceabdbe176890f1310d9211963afa9d82226205a02801ecbecfb4e0003c918db95721fbc352e8e5b0a204a9b9121a4b30c7855842b80a6a8883fc60bb17e0b0c136ae22c8614a7b5a28bc6bd8393af2345e77a13d9983022bc42f0feb8bc5ed0835365fc31aa96e9c79b8af7aa197505e94fe912b4cbc4c723a6c188b0f654538e0fdebfb25f00b00dcf5512546a5461d1f68190b5896c640daaf53c8a5ef0cdb2d2a1a859b4ccce70955e3f4aa0e247b52cd16f0741dde3706394e9f66395e75510abac3b00132dc59878c01b98e599b882c7a29582f816b791ce1710266d9b64092e0bf722fe35a7d3a38211749dc8f5762069436f8f6649dbc7cb74733677601e1eb7f7bbd84f3e1a887c4b2362918200445246ce6b8fab33146937b90c5bf8077ee0576800cbe7298e803cffec3b26de5fd97a3b948ad405c3bde241e556ba6669c50a6291ca0e7bce119a4fefac4abeae7ef97c9fe8f464d9d269ba617718905512da9c2911ec6efb3da672d95c46366ee2c610fe19a53880bad9e4a4c2f5a3d62aed1e7e07fbe222c23f67b2d096f85c7afb7d1a6a303f65405eb86a8c0b14e004cad44deff9fb5ea80767dde2c0c26b95c959809622e2f00710c5beb4375303f04f8537fe6bc12e96247f4c0e871f562a99b247f85c4bfa0c7f03eea08e26c9b23700941bf760c737afed0269eafa203328c395ea6513cc48277716e94b302ffb589a206d82e609c73014738bfe0cf1ff79e783907bde349d3c7c0790794406501e1b66c8e0fc1d176153345518d7b4cdacdf07b8bfb86639b3cc851d686344323fc3fe9a7c980795cfd1503102fbea9ae7074f3da2ea7a1c2b6e07be58269f24080890b0c2167e3c811292849d38eb5892f968150d3b6fff06be4e6ecf66f2a410546b0839f0d311dc7e98b03a4b2801ab94c70746c2edd4414b73c63a7924e28ea333bdf6f6fde9d30edcaf738627ba9dfbf70932e9fa17646638613525bf9c3f5f424831acd99a2085cba7042065b7bb144d5ba52d4adf8d79d3db1d65de088a996354c8b15e4f76d464bf9710b77e3ba464a1c6ed9c5195a0bbb53b8ba27ae7f5920680c45217e90abecb161ca0373d357d90d117d0ff2ac6fcc99ba9b92d008d154929f49e50352215c01241e79cd217321e5aaf132d3eceee995e46e3abf0ab14ae8b623a77ad51947b9489cd88a1cf29477644637c080649b04f21b3e256bf568d582a66c63f8eff89be9c78e5f274983be3d67fb5f68e6e8a8b1c1942c192c54f3f9cbbacfef3fa754c2e3f6ddfa4df400efdaeb653c1d45217a41032633c5fd68215d3872431f8be84e9f71e5f2d8b2721cfc966a33585f540c8980257c70de3782d27a1893dc27f97a40885ac3d78e880b167b37fc548c04ada4b53d63a1b493ec7ef8a46404a69d479dfda86a50493942ef1bc07e0606fd47714825389945e9d2495a4b973827b77a6206bd3688bb4e970cb63dda7bff61f190cf0bc7534e95200adf57f77d483e9f2d453df4886719523001d5324c3a4e7dbf31e9c66322a7e22e6c21b4138d8937f7a0c6f859579c158aa62efc43ae0acc4852522c13cac2e7f0c94917c9147bd41202ccada50d16b8cc8a342471e78cec5ec9701593d793801eee1092ae386623fe9c621c84b8407a5d56e78841163d891607f30de3f5cd816937d87a3f3d74e023ef739b27901c0fd31fff52bef50e5230eff26f0de4d3e9f0b4b7935b9232e2b202afbbfdc1a1fe82d2e5fd8ac91e58a4818d91746b2d854c343311876820b73dcf7e89d41620b2c9c31d5ba0685e2f85c6e7db963fa8a9117c5cae490d3f5fb32b27d4a92c648983bfa0af2d4b7a1374360cb16b0bd60c30bece9a84fc31784d1c8040ad0d9169cdf3b6e5253f2e9c7fa5fed439c4e22f37277f1b7e35ab49f5a2fc30108f8171b747c62d6f6736436f96201018b153e146f946cad8f50fc4cfbc25aa0520ec3fe7f375a8d462df1766e21badf2379c50addfec5570831b9b561bfae337897284b2f2caff7c442cd45ebd9713676d7e6421d83bf0dffa6eca519024e5a25b5a13c929c83d05342f802e495b78f40d22c26c3718df5b5aeed5e090073bf2bc123bd5502d9e8c0453f476de2bdc00e1bb7da942b225a4df8c025f728bdb85854b0860a1604066b8d271ca540334774c477deb3c062ce798a6eda16bc9c09e184c953f8bafb50d9d09c8efd89798a2e0bf47039c538cd716b5ba9bcef9e44fe306ec8768ab231699a9e62d8a70320530fa10626267bb8bc276cc9a28105f1d6307c14af7a585227b8d2c821adb85760a61cadc02eefe5526e1a85a1cdca8cb5758609774d3c2ba3ae6a093db8378f8aa50e71f3feae2f102f1fc6ca4d694050b89dc627302288fbf00dadd4fe26e05ef7ba0f0e4b6de7d057c147515a5f07b0372f91a50c47faedac6a72ca3bc48b065335add0231815181083192eae6f0761ac5ff4ca06b9ab6d8373daf50a5ab03964c3119f5e2dbd6e2384290d8faa084416c18d480cb033bd268921a42806fd14316a430492baf8deba906514def3ad4934c2a9dea9eb521f5eae7cda3dac7a571f24d59f71f0b47307fcbdb9f94956a54df3219e999de45f56f6a4c19507e4f7d785320ba8a328b3750d7a59c04544835e3b3d38fce1813d9f20c837203a68eb60c293da7a5fe8251db3047b9ef84b1da83e57a7cb20c39cf3a55ee56de37a49163891f660f58befba333bd142c20868a041edac62510221f9f71a26b791068e72ac103d19e806e3af8f67dc97ff2fd875122e8b7122645b348dbba9535beb1dee4b9f2511bad74be9f8653425dc1799c952b4e42bb05f420987f23ae88d938026b63cf2905dc1dd2738d499a33ed24862aff23e4e56f1ff3c6970027fc520e02a59df100819b0d9aacba324f3822cb2b56dfcdf87620e3ad6bc74fbcb6d337f755b851b6b9ea1000cbdb87d4efdd73c7bdd7ad77959b1fab34f6a9f76b958725d27884dc0f3ebdd207cedcc7f4e5f39a75e904910af0eb6da91b3bb8d07b909fb3deffd9bca5b0cac793785d3291cedb5b4bb4ed5ca38b9c1acb18ef42926561118771cdf98912ff89c614d84b1e2abb8deae1ca8915e268e1d0ce3d46215170aa76814271b0e298dc2999c2ba867370b875c8b956c10beb578b01595ee5fd5f522d35c7a5674d376b92f8873df1160a3f7c2ec613d5d86b5f2361d6cb466bca73b46b3935ac18e62d05140a429de4b1eedde6d151859b1ead40cd2c0849dc90371be3dac362649c183bbcb628775580fbbfeeb5803075c431c96dee87f8880e8633e20f89d7b1fbeefeb236ad2cee0de69258cd4170c2473e6b2c3d8ff363cff8d7cd80536c8d47edc5df9497ffe6e33ea7095fdf4b11166422115d37c6391a3ea622203088dc84640a591ae3a51eecba41b99e9ede9babb285474314d813c128a542c3e8a3e40b57e65aad74bcf744a32b710bac3f8e8259c5ef75569a8ba30eae957bfd045d4340877cc2819e6745247df64f5a959ad4956fabad69394c8f99f61d6ea7e912e72baf44f0de00b08134cca9e7d3ef36778d49f9d6cee29279835ed23e2ed2c18baf0c478e0741d07fe95e7a904957cbb867df608d1aab751f82e2af8551bfb094151b1a4d2ef5c12dc32fd2f6011915bd77d2c0e274da463a3afe10fa5304ef055a951bcbb001852d29c4869d157e084a6b02ad4b1fe53f5961b5cb6ea96f4335d48805602aa4798ecf2cbcb2ef736043defdfdcbe6a5f29c712fb79afadcd5bdd09661497ff2f18ffa0caea8511436384bb3c71ffe1bac64a51c087378aedf67773a6a272098afc198c62cd86ef84f18f1f1ddc642fbd2c9cd37f7704a5a018641369de46b4a24f18c033fa06ce872065e7c304d4e222e1b142457a2f50b6052780dbcee3f381497db4ed36a0233753da2448e87834371c218b69aa370e6deb04da21234f4f99e106475296b44114ba36c6d498dbf68c27ae67aa0fc412bf0a7e1f1921b138e1c3d854b9bf6466dab182f167469232c45135b08f7785d4e407150705a0ed38ad485b669c424d03b604e38bc7bd7121bdc08d1950dbc492e64255f8f1cefd8f4971e3758871ce4348df086a1a40da9f744b0aaa3078015540f888f8ba416334c26fe5c5fe537cb609117874e84f93207f177c3dc0c288003002536fdea743cec2993070dd959e44af60dd29377ea1a9458989966468044fc403ceec18675b629ef1160c697c6bb5b6075a86283c5aa946453a7be337029396cd610b79723f25d1ee86cddb2e67190a712e7bf50c1c652f93d4d1e12cc1df63ecd13fcf203348a8824fd89c236e2ff7928863d2778df809caccef9e1267fa1548c3ad92fcb2c16ade6f8dcca0b91ec0086178d9f0b54501db62392aa43df6944d6b764075279d3bd89e004e0cb5793c5cdcb4a4728e175f467e498a7e2f7a1c71f5a703a7318e28bb5675c25571404e6cbf4b01c279b5e042a00d6dde8dca4d8931b90eed3037b2517d07d9908992b11875b507e18f0898661fc6d5a484cba75ebac930a44fac7252b4c4a7921a6885d7b37e448fa597c459b48c26c72b93780ca85d803929e942317c5561935f3b5401f2aec9d7d1bb8c66031286182a39119411c19bc03b89c245e60466684846f71b899d7c7853faeb1b3f465412b9541082e5d51d6716a661491f379f681c45d1f30bef1b3350f1744456ce50a1c80f485ca5f141182c2f48218b00eaa4e0ee1a7b3087b267dfd5a21c20b407fbf16f24e7883c46bde3378f7e905070cbc775496e71b45fb9a95fba5c6307aa861b23644137fed8f4c128f9668dd0df3ec043355237c940df9dbeb6d72300858768304acc8cd86db2fa5b78b8965acdd244677ccf7a9800a020f488e8010c7f5f646d9ac71f7a55f5193d50f3cdbb0822a73acf8aea8286a1c50d6d006b05a06c2501aadad0a44c411fef09a7ce3dfef50b73728076c39e5ad89d344cdbaccd63e9a033dcfaacf02d0c932b712b026602cf334a8908fa102fe1bba13e82a7c7ee6879484b8b6744c04616931c8b1ddbf35768b5edac1c53be115b30eadf849fa4b7e0489fe024567796eee28b51bf4bbc567f16a3e2ce2e9bc17275829d6e37ed3876bc7b86a9f9f18cb1c329e9fbe36f15fce052627d49622212ca6350727d32aa2b611aae40d5930152e20934002a18b612b5eca4097566eccaf2c5552be24638d58cf9ffcac6f3a0089c2564efa03ea52839ab4566c823f7fc37dbf2c1fe0bc8d9b5e846bb0d283e5bcc27e8501835d8a1c9777bc4ede40c7983cf3c573a389dc3abc532ed29b830eec9c3762e5a11ac736e6a26d166c6f6ff31a9b43c1b8bbf58fda33984b1ce918befb154b53d56f59bb8a891018d7f35a4f94a3701a6eace76920553389e60db540e55022a39e256ee51fbc9cff7e9570a6f48a8b2e50786cf745d4b2c567ca7538cac3f4118fedf0be23b4da9fc273222", 0x1000, 0x2}], 0x0, &(0x7f0000002380)={[{@hash_rupasov='hash=rupasov'}, {@tails_small='tails=small'}, {@noquota='noquota'}, {@hash_r5='hash=r5'}, {@grpjquota='grpjquota'}], [{@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) fcntl$setlease(r0, 0x400, 0x3) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$team(&(0x7f0000002600)='team\x00') 03:36:43 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x894c, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 833.421005] input: syz1 as /devices/virtual/input/input1730 03:36:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:43 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-des3_ede-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f00000002c0), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$nfc_llcp(r2, &(0x7f0000000e00)=[{&(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "23b9bee8cfc1d378721cea5a71b1734d61cb116204accbe7bb96c66fa6a5f899e830d0c9a961788cd3fe43ae615dafa7b0887223479062fe05adecfdc0de2b"}, 0x60, &(0x7f0000000940), 0x0, &(0x7f0000000a00)={0x10}, 0x10}], 0x1, 0x8000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x4e24, @remote}}) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@gettaction={0x14}, 0x14}}, 0x0) recvmsg$kcm(r2, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x7ffff000}, {&(0x7f0000000540)=""/15, 0xf}], 0x2}, 0x0) [ 833.478582] input: syz1 as /devices/virtual/input/input1731 [ 833.505693] XFS (loop0): Invalid superblock magic number 03:36:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x48}, 'syz1\x00'}) 03:36:43 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8911, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xfffffffffffffcf6) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x202000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000380)={@broadcast, @multicast1, 0x0}, &(0x7f00000003c0)=0xc) recvfrom$packet(r2, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000400)={0x11, 0x17, r3, 0x1, 0x3, 0x6, @local}, 0x14) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0xffff, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x6, {"05c835fd1c75777c66f435bd6a51ebd5"}, 0x6, 0x76a7a1d0, 0x1}, @ib={0x1b, 0x0, 0x5, {"79a9a046eb830820d43469bd362e7a69"}, 0x8d, 0x0, 0x2}}}, 0x118) 03:36:43 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 833.646260] input: syz1 as /devices/virtual/input/input1732 03:36:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/loop-control\x00', 0x2d334d277d97035a, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, 0x0, 0x8}) open_by_handle_at(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b0000f5e6f7ffff393009"], 0x10000) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0xff}, &(0x7f00000000c0)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={r2, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'bridge0\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x7, 0x4e23, 0x0, 0x0, 0x0, 0x0, 0xff, r3}, {0x0, 0xffffffff, 0x0, 0x31, 0x0, 0x0, 0x100, 0x9}, {}, 0x0, 0x6e6bb5, 0x0, 0x0, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x0, @in6=@remote, 0x3507, 0x3, 0x1, 0x0, 0xc723}}, 0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8932, &(0x7f0000000280)={"68cbd700", 0x3ffc}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x3, @dev={[], 0x1f}, 'syzkaller1\x00'}}) 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:44 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 833.688322] input: syz1 as /devices/virtual/input/input1733 03:36:44 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x3f, 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x400, @loopback, 0x9}}, 0x3, 0x4, 0x100000001, 0x4, 0x20}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in={{0x2, 0x4e23, @local}}, 0x100, 0x1}, &(0x7f0000000480)=0x90) r2 = syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000000c0)=0x800) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x62ffcdd2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000180)={r3, 0x7, 0x5f0, 0x554, 0x800, 0x8, 0x2, 0x69db9534, {r4, @in6={{0xa, 0x4e20, 0xffff, @dev={0xfe, 0x80, [], 0x17}, 0x200}}, 0x3ff, 0xe2, 0x40, 0x9}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000004c0)={r5, 0xfff}, 0x8) 03:36:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x60}, 'syz1\x00'}) [ 833.803915] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.811194] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.834843] device bridge0 left promiscuous mode 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 833.894012] XFS (loop0): Invalid superblock magic number [ 833.924688] input: syz1 as /devices/virtual/input/input1734 [ 833.981346] input: syz1 as /devices/virtual/input/input1735 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4000000}, 'syz1\x00'}) 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 834.127036] input: syz1 as /devices/virtual/input/input1736 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 834.212481] input: syz1 as /devices/virtual/input/input1737 03:36:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x30d40000}, 'syz1\x00'}) [ 834.369535] input: syz1 as /devices/virtual/input/input1738 [ 834.390351] input: syz1 as /devices/virtual/input/input1739 03:36:44 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="78667380", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_adj\x00') r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r1) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000180)=""/28) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:36:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x41d40000}, 'syz1\x00'}) [ 834.677807] input: syz1 as /devices/virtual/input/input1740 [ 834.737221] input: syz1 as /devices/virtual/input/input1741 03:36:45 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'user.', '@%ppp0mime_typeq-trusted\x00'}, &(0x7f00000001c0)=""/162, 0xa2) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r2, &(0x7f0000000100), 0x80000001) 03:36:45 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8995, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}, 0x0}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_adj\x00') r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, r1) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000180)=""/28) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:36:45 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4c000000}, 'syz1\x00'}) 03:36:45 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x4020940d, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 834.943848] input: syz1 as /devices/virtual/input/input1742 03:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x1a9, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 834.990909] input: syz1 as /devices/virtual/input/input1743 03:36:45 executing program 1: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8995, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x40d4000000000000}, 'syz1\x00'}) 03:36:45 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8946, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 835.109721] IPVS: ftp: loaded support on port[0] = 21 [ 835.118522] XFS (loop0): Invalid superblock magic number [ 835.127976] device bridge_slave_1 left promiscuous mode [ 835.133633] bridge0: port 2(bridge_slave_1) entered disabled state 03:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xf0ffffff7f0000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 835.193728] input: syz1 as /devices/virtual/input/input1744 [ 835.199648] device bridge_slave_0 left promiscuous mode [ 835.224117] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.243575] input: syz1 as /devices/virtual/input/input1745 03:36:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x100000000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 835.301335] team0 (unregistering): Port device team_slave_1 removed [ 835.311596] team0 (unregistering): Port device team_slave_0 removed [ 835.339682] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 835.399369] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 835.437960] bond0 (unregistering): Released all slaves [ 835.485275] bridge0: port 2(bridge_slave_1) entered blocking state [ 835.491690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 835.498420] bridge0: port 1(bridge_slave_0) entered blocking state [ 835.504815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 835.511500] device bridge0 entered promiscuous mode [ 835.517193] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 835.634286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 836.098052] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.104578] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.111843] device bridge_slave_0 entered promiscuous mode [ 836.136070] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.142524] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.149809] device bridge_slave_1 entered promiscuous mode [ 836.185659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 836.210082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 836.274513] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 836.299520] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 836.397480] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 836.404803] team0: Port device team_slave_0 added [ 836.426645] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 836.433752] team0: Port device team_slave_1 added [ 836.456358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 836.481875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 836.506363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 836.531979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 836.736225] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.742754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.749453] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.755838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 836.763175] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 837.488483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 837.560173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 837.633229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 837.639521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 837.647346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 837.654940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 837.727115] 8021q: adding VLAN 0 to HW filter on device team0 03:36:48 executing program 5: r0 = memfd_create(&(0x7f0000000040)='ramfs\x00', 0x4) io_setup(0x2, &(0x7f00000000c0)=0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x100000000049) io_submit(r1, 0x2, &(0x7f00000019c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000280)}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x2, 0x7, r0, &(0x7f0000000980)="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", 0x1000, 0x9}]) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0xbd9fc3c83eef2938) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000001c0)={r2, 0x3, 0x8, 0x401, 0x0, 0xd9bb, 0xd4}) 03:36:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x2ed4000000000000}, 'syz1\x00'}) 03:36:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xf0ffffff00000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:48 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:48 executing program 1: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x35b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x41) getsockopt$nfc_llcp(r3, 0x118, 0x7, &(0x7f0000000180)=""/49, 0x31) write$USERIO_CMD_REGISTER(r3, &(0x7f0000000140)={0x0, 0x2}, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7fff) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000200)={r4, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) ioctl$KVM_NMI(r3, 0xae9a) 03:36:48 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8982, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x60}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x1d, 0xf7ffffff0000000d, 0x0, 0x0, {0x7592da1f}}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f00000002c0)='vmnet0\x00', 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000400)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000300)={0x0, 0x4d34115f}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r2, 0xffffffff}, &(0x7f00000003c0)=0x8) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8800, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_getmulticast={0x14, 0x3a, 0x8, 0x70bd29, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) [ 838.195894] input: syz1 as /devices/virtual/input/input1746 [ 838.219404] input: syz1 as /devices/virtual/input/input1747 03:36:48 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8949, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x200000c0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:48 executing program 5: r0 = socket(0xa, 0x447eb05f6d76b76d, 0x7f) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @multicast1, 0x0}, &(0x7f0000000040)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r1}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000700)={0x7, 0x4d, 0xffffffffffffffff}, 0x7) socketpair$inet(0x2, 0x3, 0x7, &(0x7f0000000100)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x40400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r3, 0x2}}, 0x18) socket$bt_rfcomm(0x1f, 0x1, 0x3) 03:36:48 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x400000000000000a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@broadcast, @in6}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001cc0)=0xe8) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) rt_tgsigqueueinfo(0x0, 0x0, 0xd, &(0x7f00000000c0)={0x3a, 0x1}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000100)={0x0, 0x0, 0x9a, 0x4, 0x3ff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x7fffffff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x1ff, 0x20}, &(0x7f0000000200)=0xc) [ 838.321505] XFS (loop0): Invalid superblock magic number 03:36:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x33d40000}, 'syz1\x00'}) 03:36:48 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:48 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8922, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x7fffeff0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 838.442065] input: syz1 as /devices/virtual/input/input1748 [ 838.470894] input: syz1 as /devices/virtual/input/input1749 03:36:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x49d40000}, 'syz1\x00'}) [ 838.597994] bridge0: mtu less than device minimum 03:36:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x20007b00, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 838.642735] bridge0: mtu less than device minimum 03:36:49 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x7}, 0x2c) r1 = memfd_create(&(0x7f0000000140)=')\x00', 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYBLOB="0024ade3776a7f292b59b9cb0ebb404d7d0bdd5f5b0ab7c2"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000280)={@loopback, 0x2c, r3}) setsockopt$inet6_int(r2, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0xf4, 0x15, 0x8]}, 0x75, r4}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r4}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x78e0, 0x8, 0xffffffffffffff7a, 0x1000}, 0x8) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f000089b000)}, 0x1ec) r7 = socket(0x2, 0x6, 0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x20, 0x40000000000004, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r8, &(0x7f0000000000), &(0x7f00000002c0)=""/206}, 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xe7d, @mcast2}}, [0x94, 0x200, 0x10001, 0x6, 0x0, 0x1ff, 0x6, 0xbe, 0x8, 0x7baf0171, 0xfffffffffffffff8, 0x20, 0x8, 0x7f, 0x6]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x20, 0x9}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:49 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs~', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:49 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc020660b, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 838.715748] input: syz1 as /devices/virtual/input/input1750 [ 838.808483] input: syz1 as /devices/virtual/input/input1751 03:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x3700000000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:49 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 838.934905] device bridge_slave_1 left promiscuous mode [ 838.940624] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.042280] IPVS: ftp: loaded support on port[0] = 21 [ 839.051306] device bridge_slave_0 left promiscuous mode [ 839.060583] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.139912] team0 (unregistering): Port device team_slave_1 removed [ 839.159569] team0 (unregistering): Port device team_slave_0 removed [ 839.173473] XFS (loop0): Invalid superblock magic number [ 839.181200] bond0 (unregistering): Releasing backup interface bond_slave_1 03:36:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4$unix(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x6e, 0x800) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x89b0, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x0, 0x7000000}}) close(r3) close(r2) 03:36:49 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8906, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd43d}, 'syz1\x00'}) 03:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x7b002000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 839.228127] bond0 (unregistering): Releasing backup interface bond_slave_0 03:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xc7edff7f00000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 839.298564] input: syz1 as /devices/virtual/input/input1752 [ 839.330110] bond0 (unregistering): Released all slaves [ 839.361789] input: syz1 as /devices/virtual/input/input1753 03:36:49 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5450, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x3f000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 840.052836] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.059512] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.067314] device bridge_slave_0 entered promiscuous mode [ 840.103071] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.109632] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.117004] device bridge_slave_1 entered promiscuous mode [ 840.140351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 840.171772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 840.241558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 840.267303] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 840.368642] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 840.376689] team0: Port device team_slave_0 added [ 840.399544] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 840.406899] team0: Port device team_slave_1 added [ 840.430246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 840.454838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 840.480693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 840.506493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 840.722426] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.728995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.735669] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.742074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.749685] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 841.482624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 841.554253] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 841.627605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 841.633747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 841.641283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 841.704361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 841.714432] 8021q: adding VLAN 0 to HW filter on device team0 03:36:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r3 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000600), 0x2) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000040)) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) readahead(r1, 0x0, 0x8000) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) 03:36:52 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)="786673e0", &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd43f}, 'syz1\x00'}) 03:36:52 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) r1 = socket$inet(0x2, 0x2000000080002, 0x0) write$P9_RSTAT(r0, &(0x7f0000000140)={0x80, 0x7d, 0x1, {0x0, 0x79, 0x4, 0x8001, {0x24, 0x1, 0x1}, 0x100000, 0x80000000, 0x5, 0xffffffff, 0x1f, 'cpusetuserselinuxwlan1%trusted-', 0x1, '\x00', 0xb, 'bcsf0\x00\x00\x00\x00\b\x00', 0x1b, '&mime_typemime_typevboxnet1'}}, 0x80) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000000), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x2, &(0x7f0000000300), &(0x7f0000000a80)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', "73697430000002000000ffff00", 'bond0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1a8) 03:36:52 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8929, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x3f00, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:52 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)={0xc8, r2, 0x304, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x0, 0x2}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000400)=""/55, 0x37}], 0x3, &(0x7f0000000540)=""/221, 0xdd, 0x100000001}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000740)=""/141, 0x8d}, {&(0x7f00000004c0)=""/5, 0x5}], 0x2, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000cc0)}], 0x1, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/99, 0x63}, {&(0x7f0000001800)=""/237, 0xed}], 0x2, &(0x7f0000001900)=""/1, 0x1, 0x4}, 0x20}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/118, 0x76}, {&(0x7f0000001c40)=""/250, 0xfa}, {&(0x7f0000001d40)=""/134, 0x86}], 0x3, &(0x7f0000001e80)=""/250, 0xfa}, 0x6}], 0x5, 0x100, &(0x7f0000002140)={0x0, 0x989680}) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) fcntl$setflags(r0, 0x2, 0x1) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:36:52 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 842.194390] input: syz1 as /devices/virtual/input/input1754 03:36:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="00000000010001000000000000000000da418ec1c7ac0e91"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000ef80)=ANY=[@ANYBLOB="01000000020800000000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010400000000000001000000790eaada477f17eb0466954fde591dc90c063609453fae73d0f0777c568dde70b8f5ca34f33a9a82d81e455bc6ca3479893215467e3bb85ea1247aafde2b1701"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r1}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x3, 0x0, 0x0, {0x77359400}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a7284b28a18e079b"}}, 0x48}}, 0x0) [ 842.240184] input: syz1 as /devices/virtual/input/input1755 03:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xff03, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:52 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:52 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8933, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x3f00000000000000}, 'syz1\x00'}) 03:36:52 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xeffdffff00000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:52 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e0, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 842.469911] input: syz1 as /devices/virtual/input/input1756 03:36:52 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 842.551709] XFS (loop0): Invalid superblock magic number [ 842.584327] input: syz1 as /devices/virtual/input/input1757 03:36:53 executing program 5: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:53 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)={0xc8, r2, 0x304, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x0, 0x2}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000400)=""/55, 0x37}], 0x3, &(0x7f0000000540)=""/221, 0xdd, 0x100000001}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000740)=""/141, 0x8d}, {&(0x7f00000004c0)=""/5, 0x5}], 0x2, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000cc0)}], 0x1, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/99, 0x63}, {&(0x7f0000001800)=""/237, 0xed}], 0x2, &(0x7f0000001900)=""/1, 0x1, 0x4}, 0x20}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/118, 0x76}, {&(0x7f0000001c40)=""/250, 0xfa}, {&(0x7f0000001d40)=""/134, 0x86}], 0x3, &(0x7f0000001e80)=""/250, 0xfa}, 0x6}], 0x5, 0x100, &(0x7f0000002140)={0x0, 0x989680}) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) fcntl$setflags(r0, 0x2, 0x1) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:36:53 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8913, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x500}, 'syz1\x00'}) 03:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xc000002000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:53 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 842.756378] input: syz1 as /devices/virtual/input/input1758 [ 842.769973] input: syz1 as /devices/virtual/input/input1759 03:36:53 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)={0xc8, r2, 0x304, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x0, 0x2}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000400)=""/55, 0x37}], 0x3, &(0x7f0000000540)=""/221, 0xdd, 0x100000001}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000740)=""/141, 0x8d}, {&(0x7f00000004c0)=""/5, 0x5}], 0x2, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000cc0)}], 0x1, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/99, 0x63}, {&(0x7f0000001800)=""/237, 0xed}], 0x2, &(0x7f0000001900)=""/1, 0x1, 0x4}, 0x20}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/118, 0x76}, {&(0x7f0000001c40)=""/250, 0xfa}, {&(0x7f0000001d40)=""/134, 0x86}], 0x3, &(0x7f0000001e80)=""/250, 0xfa}, 0x6}], 0x5, 0x100, &(0x7f0000002140)={0x0, 0x989680}) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) fcntl$setflags(r0, 0x2, 0x1) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:36:53 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8937, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0xd452}, 'syz1\x00'}) 03:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x8dffffff, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 843.003544] XFS (loop0): Invalid superblock magic number [ 843.012719] input: syz1 as /devices/virtual/input/input1760 03:36:53 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8903, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 843.078597] input: syz1 as /devices/virtual/input/input1761 03:36:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xffffff7f, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:53 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 843.351626] XFS (loop0): Invalid superblock magic number [ 843.412240] XFS (loop0): Invalid superblock magic number [ 843.604733] device bridge_slave_1 left promiscuous mode [ 843.610451] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.655021] device bridge_slave_0 left promiscuous mode [ 843.660506] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.748205] team0 (unregistering): Port device team_slave_1 removed [ 843.757425] team0 (unregistering): Port device team_slave_0 removed [ 843.767461] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 843.838036] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 843.914710] bond0 (unregistering): Released all slaves 03:36:54 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/cgroup\x00') ioctl$VT_RELDISP(r1, 0xb701) 03:36:54 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8931, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x57d4000000000000}, 'syz1\x00'}) 03:36:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x2000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:54 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)={0xc8, r2, 0x304, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xc}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x0, 0x2}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001f80)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000400)=""/55, 0x37}], 0x3, &(0x7f0000000540)=""/221, 0xdd, 0x100000001}, 0x4}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000740)=""/141, 0x8d}, {&(0x7f00000004c0)=""/5, 0x5}], 0x2, &(0x7f0000000900)=""/52, 0x34}, 0x7f}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000cc0)}], 0x1, &(0x7f0000000dc0)=""/80, 0x50}, 0x9}, {{&(0x7f0000001540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/99, 0x63}, {&(0x7f0000001800)=""/237, 0xed}], 0x2, &(0x7f0000001900)=""/1, 0x1, 0x4}, 0x20}, {{&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/118, 0x76}, {&(0x7f0000001c40)=""/250, 0xfa}, {&(0x7f0000001d40)=""/134, 0x86}], 0x3, &(0x7f0000001e80)=""/250, 0xfa}, 0x6}], 0x5, 0x100, &(0x7f0000002140)={0x0, 0x989680}) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) fcntl$setflags(r0, 0x2, 0x1) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:36:54 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 844.590377] input: syz1 as /devices/virtual/input/input1762 03:36:54 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a3, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) [ 844.641577] input: syz1 as /devices/virtual/input/input1763 03:36:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xf0ffffff, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:55 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs`', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) 03:36:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x200000000008912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000040)) timerfd_gettime(r1, &(0x7f00000000c0)) 03:36:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x51) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x4fd40000}, 'syz1\x00'}) 03:36:55 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x6) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c9, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x0, '90\ty'}, 0x48c000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000480)) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x2, &(0x7f0000000000)={"6272696467653000000100"}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x7, 0x22, 0x6, 0x0, 0x5}, 0x14) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000380)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$int_in(0xffffffffffffffff, 0x200000000541d, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) 03:36:55 executing program 1: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000007002e2f66696c6530000000000000"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x2080, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000400)=0x101) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x40000, 0x100) write$P9_RSYMLINK(r1, &(0x7f0000000080)={0x14, 0x11, 0x1, {0x49, 0x4, 0x4}}, 0x14) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2a0000002901000000000000000000000000000000000000000054e20c99884fa25cd893720000000000"], 0x2a) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000006c0)={r3, @in={{0x2, 0x4e21, @rand_addr=0x2ede403e}}, 0x8, 0x7ff}, 0x90) write$P9_RGETATTR(r1, &(0x7f0000000600)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RMKDIR(r1, &(0x7f0000000180)={0x14, 0x49, 0x1, {0x0, 0x1}}, 0x14) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) [ 844.843667] input: syz1 as /devices/virtual/input/input1764 03:36:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x1000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 844.894765] IPVS: ftp: loaded support on port[0] = 21 [ 844.919205] input: syz1 as /devices/virtual/input/input1765 [ 844.965508] WARNING: CPU: 1 PID: 5505 at mm/slab_common.c:1031 kmalloc_slab+0x56/0x70 [ 844.967195] kobject: 'ip_vti0' (0000000063566ac3): kobject_add_internal: parent: 'net', set: 'devices' [ 844.973522] Kernel panic - not syncing: panic_on_warn set ... [ 844.973522] [ 844.973540] CPU: 1 PID: 5505 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #56 [ 844.973558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.002604] kobject: 'ip_vti0' (0000000063566ac3): kobject_uevent_env 03:36:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xfffffffffffffce2, 0x8000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x3b0d}}, [0x3ff, 0x2, 0xfffffffffffffff9, 0x9, 0x1, 0x9, 0x6, 0x9, 0x0, 0x1, 0x4, 0xff, 0x0, 0x2, 0x4]}, &(0x7f0000000380)=0x100) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0xfffffdef, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:36:55 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000005c0)) [ 845.007004] Call Trace: [ 845.007030] dump_stack+0x1c4/0x2b4 [ 845.007048] ? dump_stack_print_info.cold.2+0x52/0x52 [ 845.007069] panic+0x238/0x4e7 [ 845.007087] ? add_taint.cold.5+0x16/0x16 [ 845.013788] kobject: 'ip_vti0' (0000000063566ac3): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 845.016270] ? __warn.cold.8+0x148/0x1ba [ 845.016291] ? kmalloc_slab+0x56/0x70 [ 845.016303] __warn.cold.8+0x163/0x1ba [ 845.016318] ? kmalloc_slab+0x56/0x70 [ 845.016331] report_bug+0x254/0x2d0 [ 845.016346] do_error_trap+0x1fc/0x4d0 [ 845.016359] ? math_error+0x3f0/0x3f0 [ 845.016375] ? p9_fid_destroy+0x9f/0xd0 [ 845.016392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.016413] ? trace_hardirqs_on_caller+0x310/0x310 [ 845.020547] kobject: 'event4' (00000000bcedb2e8): kobject_cleanup, parent (null) [ 845.025328] ? p9_fid_destroy+0x9f/0xd0 [ 845.025349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.025367] do_invalid_op+0x1b/0x20 [ 845.025383] invalid_op+0x14/0x20 [ 845.025406] RIP: 0010:kmalloc_slab+0x56/0x70 [ 845.031987] kobject: 'event4' (00000000bcedb2e8): calling ktype release [ 845.032746] Code: c5 60 ab 00 89 5d c3 48 85 ff b8 10 00 00 00 74 f4 83 ef 01 c1 ef 03 0f b6 87 80 aa 00 89 eb d8 31 c0 81 e6 00 02 00 00 75 db <0f> 0b 5d c3 48 8b 04 c5 a0 aa 00 89 5d c3 66 90 66 2e 0f 1f 84 00 [ 845.032755] RSP: 0018:ffff8801830f7980 EFLAGS: 00010246 [ 845.042600] kobject: 'queues' (00000000db0532cb): kobject_add_internal: parent: 'ip_vti0', set: '' [ 845.046457] RAX: 0000000000000000 RBX: 0000040000000449 RCX: ffffc90003e86000 [ 845.046466] RDX: 000000000001226e RSI: 0000000000000000 RDI: 0000040000000449 [ 845.046475] RBP: ffff8801830f7980 R08: ffff880180e56700 R09: fffffbfff12e13a4 [ 845.046484] R10: fffffbfff12e13a4 R11: ffffffff89709d23 R12: fffffffffffffff4 [ 845.046492] R13: ffff8801ca2d7280 R14: ffff8801ca2d7280 R15: 0000000000608040 [ 845.046525] __kmalloc+0x25/0x760 [ 845.052837] kobject: 'queues' (00000000db0532cb): kobject_uevent_env [ 845.054216] ? v9fs_mount+0x764/0x8f0 [ 845.054231] ? __v9fs_get_acl+0xc5/0x170 [ 845.054248] __v9fs_get_acl+0xc5/0x170 [ 845.058055] kobject: 'queues' (00000000db0532cb): kobject_uevent_env: filter function caused the event to drop! [ 845.061685] v9fs_get_acl+0xe5/0x2a0 [ 845.065986] kobject: 'event4': free name [ 845.069376] v9fs_mount+0x636/0x8f0 [ 845.069396] mount_fs+0xae/0x31d [ 845.069418] vfs_kern_mount.part.35+0xdc/0x4f0 [ 845.073579] kobject: 'event4' (000000000a6e285c): kobject_add_internal: parent: 'input1765', set: 'devices' [ 845.078247] ? may_umount+0xb0/0xb0 [ 845.078263] ? _raw_read_unlock+0x2c/0x50 [ 845.078277] ? __get_fs_type+0x97/0xc0 [ 845.078293] do_mount+0x581/0x31f0 [ 845.078311] ? kasan_check_read+0x11/0x20 [ 845.083483] kobject: 'rx-0' (00000000e7cad274): kobject_add_internal: parent: 'queues', set: 'queues' [ 845.091828] ? do_raw_spin_unlock+0xa7/0x2f0 [ 845.091845] ? copy_mount_string+0x40/0x40 [ 845.091856] ? kasan_check_write+0x14/0x20 [ 845.091870] ? kasan_unpoison_shadow+0x35/0x50 [ 845.091880] ? kasan_kmalloc+0xc7/0xe0 [ 845.091898] ? kmem_cache_alloc_trace+0x31f/0x750 [ 845.091915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.091933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.096513] kobject: 'input1764' (00000000cafff815): kobject_uevent_env [ 845.100763] ? copy_mount_options+0x288/0x380 [ 845.100779] ksys_mount+0x12d/0x140 [ 845.100796] __x64_sys_mount+0xbe/0x150 [ 845.104651] kobject: 'rx-0' (00000000e7cad274): kobject_uevent_env [ 845.107993] do_syscall_64+0x1b9/0x820 [ 845.108015] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.112527] kobject: 'input1764' (00000000cafff815): fill_kobj_path: path = '/devices/virtual/input/input1764' [ 845.119199] ? syscall_return_slowpath+0x5e0/0x5e0 [ 845.119213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.119230] ? trace_hardirqs_on_caller+0x310/0x310 [ 845.119245] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 845.119265] ? prepare_exit_to_usermode+0x291/0x3b0 [ 845.138354] kobject: 'rx-0' (00000000e7cad274): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 845.143591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.153412] kobject: 'tx-0' (0000000050ec203a): kobject_add_internal: parent: 'queues', set: 'queues' [ 845.160499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.160511] RIP: 0033:0x457519 [ 845.160527] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.160535] RSP: 002b:00007f93aa992c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 845.160548] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457519 [ 845.160554] RDX: 00000000200003c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 845.160561] RBP: 000000000072bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 845.160576] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93aa9936d4 [ 845.169669] kobject: 'input1764' (00000000cafff815): kobject_cleanup, parent (null) [ 845.175125] R13: 00000000004c2854 R14: 00000000004d3c30 R15: 00000000ffffffff [ 845.176283] Kernel Offset: disabled [ 845.497115] Rebooting in 86400 seconds..